Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're ...
…
continue reading
Deep dive into true crime… where real life can be stranger than fiction! Let me know if there’s any cases you’d like to hear about! You can reach me at [email protected]
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
A deep-dive into Netflix's Abducted in Plain Sight Cover art photo provided by David von Diemar on Unsplash: https://unsplash.com/@davidvondiemar
…
continue reading
Hey there, Tax Crime Junkies! For those of you who are new to our show, Tax Crime Junkies is the true crime podcast that combines our love of taxes and crime, and we’re here to bring you the inside scoop on some of the most fascinating tax-related cases out there. As tax experts and practitioners ourselves, Dom and Tom are uniquely qualified to uncover the most intricate details of these cases, and we’re not afraid to go deep. We know the ins and outs of the tax system, and we’re passionate ...
…
continue reading

1
INFAMOUS: University of Idaho Murders
1:25:32
1:25:32
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:25:32Kaylee Goncalves, Madison Mogen, Xana Kernodle, and Ethan Chapin, four University of Idaho students in their 20s, were brutally murdered inside their off-campus home in the early morning hours on November 13, 2022. Two surviving roommates and a heartwrenching 911 call led police to discover the friends stabbed to death inside the three-story house …
…
continue reading

1
AI Is Attacking Healthcare—Social Engineering EXPOSED. (Dr Sergio Sanchez)
1:03:10
1:03:10
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:03:10Dr. Sergio Sanchez—former leader and advisor at Apple, The Vatican, Activision and medical doctor—exposes how cybercriminals are using AI in healthcare and AI Social Engineering to clone voices, fake identities, and empty your savings without a trace. But that’s just the beginning… In this mind-blowing episode, we dive into: · The dark side of AI (…
…
continue reading

1
LIVE: They’re Stealing You with AI 😳 | AI Risks to Identity & How to Fight Back
1:27:24
1:27:24
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:27:24If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today. This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen! ✅ **Don’t forget to like, subscribe, and hit the bell 🔔.** 💬 Comment your “worst phishing attempt” below—I’ll…
…
continue reading

1
Building a Cybersecurity Mindset: AI, Culture, & Governance Explained
43:43
43:43
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
43:43David Mauro and DeWayne Hart explore the critical aspects of building a cyber security mindset, understanding cyber security awareness, internet governance in cyber security, and importance of culture in cybersecurity. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 …
…
continue reading
Scott Augenbaum, retired FBI Agent in the Cyber Division shares his truths framework about the FBI vs Cyber Crime and the fbi perspective of cyber crime. Topics: fbi perspective of cyber crime, fbi view of cyber crime, explaining the fbi stance on cyber crime, lessons learned from fbi on cyber crime, lessons on cyber crime from fbi, war between the…
…
continue reading

1
Emotional Firewalls: Mastering EQ to Outsmart Global Cyber Threats
44:10
44:10
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
44:10Cybercrime Junkies Podcast interviews former NATO specialist and international intelligence expert, Nadja El Fertasi, about the role played by emotional intelligence in cyber security and Emotional Intelligence in AI. We discuss emotional firewalls, learning EQ (emotional intelligence) and how it can stop social engineering attacks, how internation…
…
continue reading

1
MISSING: John & Shelly Markley
1:04:57
1:04:57
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:04:57In 1995, a married couple vanishes from their Ohio home without a trace, leaving behind their five kids, an unlocked gun cabinet, and a house full of clues. As ransom calls roll in and suspicions mount, their family is left wondering: Was this a planned disappearance? Or something more sinister? If you know anything about the disappearance of John …
…
continue reading

1
Why Cyber Attacks are Not All Equal
33:00
33:00
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
33:00Have you ever wondered why cyber attacks are not all equal? Why some of the most significant data breaches in history didn't lead to your personal information being sold on the dark web? When Data Breaches Are Really Espionage? Why did the stolen data from breaches like Anthem, Starwood/Marriott, OPM, and Equifax vanish into the ether, while other …
…
continue reading

1
Can you Spot AI Job Applicant Fraud? Think again!
42:04
42:04
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
42:04On this Cyber Crime Junkies deep-dive, we expose how deepfake job applicants, AI-powered resumes, and AI voice-cloning are turning remote hiring into the ultimate con. Real-world cases include executives duped by glitchy interview bots—and one bizarre scam channeling funds to international criminals. 👨💻 What you’ll discover: · AI resume generators…
…
continue reading

1
Cyber Security Differences Between US Versus UK
45:17
45:17
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
45:17Richard Hollis of Risk Crew (https://www.riskcrew.com) in London joins Cyber Crime Junkies studio (https://cybercrimejunkies.com) for exclusive discussion on: cyber security differences between US versus UK, how cybersecurity efforts usually fail and Difference between customers or enemies. Don't miss the video episode: https://youtu.be/5jjlJx_EyXI…
…
continue reading

1
Cyber Crime Take Down Story. LOCKBIT.
53:17
53:17
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
53:17Video Episode here! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Background 08:10 Financial Aspects of Ransomware Operations 24:…
…
continue reading

1
MYSTERIOUS DEATH OF: Jeannette Bishop May & Gabriella Guerin
1:08:06
1:08:06
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:08:06In 1980, the ex-wife of a British aristocrat and her Italian friend vanished from a small ski resort town during a snowstorm in the mountains of central Italy, and investigators had a simple theory—they got lost and had some kind of accident. But when mysterious messages arrive, clues lead them on a decades-long deep dive into the art world jet set…
…
continue reading

1
Shocking New Ways to Stop Hackers 🔥 What You Must Know
50:09
50:09
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
50:09In this episode of Cyber Crime Junkies, host David Mauro speaks with cybersecurity expert Adam Benwell, CEO of Challenge Word, about new ways to stop social engineering, Shocking New Ai Risks & How To Stop Them Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach…
…
continue reading

1
Hackers vs Businesses Leaders XX Battle of Cyber Interruption XX
21:26
21:26
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
21:26This conversation delves into Hackers vs Businesses Leaders. Battle of Cyber Interruption. It delves into the alarming rise of ransomware attacks, their impact on businesses and healthcare, and the evolving landscape of cybercrime. It highlights the staggering financial costs, the organized nature of cybercriminal operations, and the legal implicat…
…
continue reading

1
Deceptive Realities: Unmasking the Threat of Deep Fakes in Cybersecurity
1:12:34
1:12:34
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:12:34Today we discuss how deep fake videos increase security risks. Topics include: artificial intelligence risks in cyber, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, and how is ai making it harder to detect deep fakes. Takeaways Sample deepfakes are played. Can you tell?…
…
continue reading

1
How to Measure Cyber Risk Today: Guidelines for Leaders
1:03:00
1:03:00
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:03:00What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to Know Ryan Leirvik who joins us in the studio. Ryan is the CEO of Neuvik & author of Under…
…
continue reading
Many leaders have concerns about employees using AI safely. We explain how to do so in this video. Today we sit with Bill Kleyman-founder of Apolo.us, a pioneer and leader in the space about his efforts for the safe use AI and how to reduce risks with employee use of AI. This is the story of Bill Kleyman and how AI can be used for good Find more he…
…
continue reading

1
MISSING: Jennifer, Sidney, & Monique
41:11
41:11
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
41:11When a young mom and her two small daughters disappear without a trace from Topeka, Kansas, in May 2000, her family goes on a decades-long hunt for answers. But right in the middle of our reporting, the family gets a huge tip that could change everything. If you have any information about the disappearances of Jennifer Lancaster or Sidney and Moniq…
…
continue reading

1
Why Hackers Target YOU. Dark Web EXPOSED.
58:40
58:40
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
58:40Host David Mauro interviews Jeremy Samide, CEO of Blackwired, about why hackers target you. We expose the latest dark web secrets, and the latest social engineering risks. Find more about Blackwired here: https://www.blackwired.com/ Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at…
…
continue reading

1
How To Avoid Business Interruption. What Leaders Must do.
22:17
22:17
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
22:17Interview of Host David Mauro on topics of How To Avoid Business Interruption. What Leaders Must do. Covering true healthcare breaches which have killed and effected medical care along with small business guidance. Topics include: how to avoid business interruption, what business leaders need to know about cyber attacks, when ransomware kills, how …
…
continue reading

1
The Aftermath. Navigating Reputations and Protecting Your Brand Image
50:19
50:19
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
50:19James Potter, CEO of DSE, joins us in the studio for great conversation and exclusive insight on The Aftermath of Data Breaches: Navigating Reputational Damage and Protecting Your Brand Image. Reputational Harm from Data Breaches, Cybersecurity Reputation Management and Operational Leadership. Find more on DSE here: https://www.dse.team/ Topics dis…
…
continue reading

1
MURDERED: Jennifer Farber Dulos
1:02:28
1:02:28
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:02:28When Jennifer Farber Dulos vanished after dropping her five children off at school in New Canaan, Connecticut, on May 24, 2019, all eyes were on her estranged husband, Fotis Dulos. And when investigators found surveillance footage showing Fotis suspiciously stopping at multiple trash cans in a nearby city and throwing things just hours after she di…
…
continue reading

1
Hiring Fraud Exposed! Latest AI Threats to Business.
29:19
29:19
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
29:19🔥🚨NEW EPISODE 🔥🚨We delve into the Latest AI Threats To Small Business. Exposing AI Hiring Fraud! Watch to the end to see live examples of how this is happening today. Topics covered: 🔥AI Fraud in Interviews, 🔥How AI Scams Effect Business, 🔥AI Fraud In Job Interviews takeaways AI-driven fraud is a growing concern for businesses. Many resumes are now…
…
continue reading

1
Inside the Mind: Unveiling Cyber Criminals' Motives and the Real-World Dangers of Ransomware
49:49
49:49
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
49:49We explore the motives of cyber criminals, examples of cyber crime gang activities, risks of physical harm from ransomware, understanding cyber crime motive, and why its important to understand cyber crime MO (Modus Operandi). Overview of the MO (Modus Operandi) of REVIL, CONTI, HIVE, DARKSIDE and other ransomware gangs and how they drive their ope…
…
continue reading

1
Teen Hacker EXPOSED! PowerSchool Breach Puts 60M Kids at Risk | Protect Your Children Online
40:46
40:46
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
40:46Teen Hacker EXPOSED! PowerSchool Breach Puts 60M Kids at Risk | Protect Your Children Online 🚨 60 Million Students Exposed in PowerSchool Cyber Attack — What Parents Need to Know NOW A 19-year-old hacker named Matthew D. Lane pulled off one of the largest education data breaches ever, targeting PowerSchool and exposing the personal information of o…
…
continue reading