Cyber Crime publik
[search 0]
Lebih
Unduh Aplikasinya!
show episodes
 
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

Unsubscribe
Unsubscribe
Mingguan+
 
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Mind the Tech ist ein Podcast, der die dunklen Seiten der IT- und Tech-Welt beleuchtet. Dazu zählen legendäre Hackerangriffe, Datendiebstähle und Cyberattacken. Ebenso kommen die unzähligen Geschichten von Menschen auf den Tisch, die es mit Recht und Gesetz im Web nicht so ernst nehmen – und irgendwann die Konsequenzen ihres Handelns zu spüren bekommen. Wir widmen uns Antitrends und Mythen, stellen Entwicklungen im und rund ums Internet in Frage, wägen ab. Denn wir sind fest davon überzeugt: ...
  continue reading
 
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
  continue reading
 
Loading …
show series
 
NEW! Text Us Direct Here! Richard Hollis of Risk Crew in London joins Cyber Crime Junkies studio discussing key topics: why cybersecurity efforts usually fail and customers or enemies online. Video episode: https://youtu.be/QQ8l1PaDaUI Topics: 💡how cybersecurity efforts usually fail, 💡customers or enemies online 💡best practices for businesses to li…
  continue reading
 
Zwischen Demokratisierung und Dämonisierung +++++++ Links +++++++ 👉Wikipedia: Behind the Green Door (2024) Behind the Green Door (deutsch: Hinter der grünen Tür) ist ein US-amerikanischer Pornofilm von Artie und James Mitchell mit Marilyn Chambers als Hauptdarstellerin, der wie der Film Deep Throat zu den Klassikern der Pornografie zählt; er löste …
  continue reading
 
NEW! Text Us Direct Here! Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. St…
  continue reading
 
NEW! Text Us Direct Here! Sam Buckenmaier, a senior cyber leader, join us on what leadership means today and what employers want in cybersecurity. We discussed: new approaches to enter the cybersecurity field, how to have effective communication internally in business, advice on cybersecurity careers from top recruiters, approaches to enter cyberse…
  continue reading
 
NEW! Text Us Direct Here! What we all need to know about How Psychology Affects Security. Psychology of Online Security. Topics: behind scenes cyber criminals, best ways to protect business from cyber crime, cyber crime gang discussions, exposing cyber crime gangs, exposing secrets of cyber crime gangs, how can we spot fraud in business, how to lim…
  continue reading
 
NEW! Text Us Direct Here! Video Episode here! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Background 08:10 Financial Aspects of…
  continue reading
 
NEW! Text Us Direct Here! Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch a Phish…
  continue reading
 
The cloud is ever expanding and allowing people to easily scale up at rates previously impossible. However one thing that must be considered is that security becomes complicated. You have to really trust your cloud provider to hold up their end, and even trusted providers can have oversights. Sources: https://pastebin.com/2LJPjrVx…
  continue reading
 
NEW! Text Us Direct Here! After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing. Key Topi…
  continue reading
 
NEW! Text Us Direct Here! The US has signed into new law the Ban of Tik Tok effective in January. What does this mean? Topics: US Tik Tok ban. What to know, online privacy andTik Tok, national security risks from social media, identity protection in light of TikTok, why social media platforms are national security risks, why social media platform i…
  continue reading
 
MFA is becoming more and more common, but with every security innovation, threat actors figure out ways around them. Recently it came out that an unknown actor was bribing employees at T-Mobile and Verizon to perform SIM swapping attacks, which can compromise SMS based MFA codes. Sources: https://pastebin.com/h47Mijdt…
  continue reading
 
NEW! Text Us Direct Here! Chris Voss joins us to go INSIDE the famous negotiation model he created and share secrets behind Never Split the Difference, from the #1 Wall Street Journal best-selling book on Negotiation. Chris is the most decorated FBI hostage negotiator in history. He teaches his techniques at Harvard Law, Georgetown University, and …
  continue reading
 
NEW! Text Us Direct Here! Chris Voss, founder of the Black Swan Group, joins us to share the story behind Never Split The Difference, the #1 Wall Street Journal best selling book on Negotiation. The most decorated FBI hostage negotiator in history, Chris Voss teaches his model Harvard Law, Georgetown University and others. Key Takeaways how never s…
  continue reading
 
NEW! Text Us Direct Here! When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss: · ways to grow brands …
  continue reading
 
NEW! Text Us Direct Here! Great discussion with Gabe Gambill. VP with Quorum. Topics discussed: best ways to limit cyber attack liability, brand protection with identification authentication, how to limit liability from cyber attacks, newest findings on ransomware cyber crime gangs, undercover findings on ransomware cyber crime gangs, pitfalls of d…
  continue reading
 
NEW! Text Us Direct Here! Jamey Davidson, Partner at international law firm O’Hagan Meyer (https://ohaganmeyer.com). Jamey concentrates on top ways to reduce risk in cyber breach litigation, defending businesses in cyber breach class-action law suits and how to build defenses to reduce cyber breach liability. We discuss: · How Cyber Breach Litigati…
  continue reading
 
Die digitale Evolution der Intimität +++++++ Links +++++++ 👉 Ray Tomlinson sends the first email (2024) 1971Ray Tomlinson sends the first email https://www.computinghistory.org.uk/det/6116/First-e-mail-sent-by-Ray-Tomlinson/ 👉 Geschichte Von Jason (2021) Statistiken zur Pornosucht https://blockerx.net/de/blog/geschichte-von-jason/ 👉 ASCII-Porn: Die…
  continue reading
 
Darum geht's diesmalSeit seinen Anfangstagen hat das Internet einen Dauer-Untermieter: den Sex. Ob Porno-Content, Sextoy-Vertrieb, Erotik-Chats: Alles, was die Lust anheizt, findet früher oder später seinen Weg ins Netz bzw. vermengt sich mit neuen Technologien. Doch nicht immer steht am Ende der Wertschöpfungskette die Lust. Ausbeutung, Menschenha…
  continue reading
 
NEW! Text Us Direct Here! From Rupert Murdoch's global entertainment ambition to a dead hacker found hanging from a tree in a park in Germany, this true cyber crime story spans over a decade in the cut-throat Satellite TV wars, involving colorful characters, pirates, big business, technology advances and failures and those who entered the darker si…
  continue reading
 
NEW! Text Us Direct Here! This is the True Cyber Crime Story of “The Day the Lights Went Out at Sony Pictures” in 2014. Discussion about then events, what led to it, the formal findings and open questions remaining by experts. Hosts David Mauro and Mark Mosher explore their research with Special Guest, professional coach Rich Moore. Summary The con…
  continue reading
 
NEW! Text Us Direct Here! Kurt Long CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage. We discuss new approaches to safe and private messaging apps, how to keep criminals out of your private data, and why online privacy is important to freedom. Chapter…
  continue reading
 
NEW! Text Us Direct Here! Nausheen Chen joins us. She is a wildly popular professional public speaking coach with clients like leaders at Google, Amazon and huge brands like Timberland and more. Check out her site:www.speaking.coach Nausheen has a free course we encourage you to check out! https://www.speaking.coach/free-course/ She shares her insi…
  continue reading
 
There's a reason you should use a unique password for every website you use, but most people simply don't. How are you supposed to make and remember dozens of passwords for each site that are completely unique and can't be written down? What if I told you it doesn't have to be that difficult?Oleh Chloe Thonus
  continue reading
 
NEW! Text Us Direct Here! Are you real? What will Deepfake do to Security Risk? Shocking Examples. Summary In this conversation, Dino Mauro and Mark Mosher discuss the rise of deepfake technology and its implications for individuals, families, and organizations. They explore the real-world applications of deepfake, the advancements in technology, a…
  continue reading
 
NEW! Text Us Direct Here! Paul Eckloff was a US Secret Service Agent for 23 years. Today we discuss how deep fake videos increase security risks. Topics include: artificial intelligence risks in cyber, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, and how is ai making i…
  continue reading
 
NEW! Text Us Direct Here! In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite. KEY TOPICS: · how risk appetite effects your cyber security plans, · explaining risk appetite in cyber security to leadership, · how security planning involves risk appetite, · new w…
  continue reading
 
Loading …

Panduan Referensi Cepat