A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Mind the Tech ist ein Podcast, der die dunklen Seiten der IT- und Tech-Welt beleuchtet. Dazu zählen legendäre Hackerangriffe, Datendiebstähle und Cyberattacken. Ebenso kommen die unzähligen Geschichten von Menschen auf den Tisch, die es mit Recht und Gesetz im Web nicht so ernst nehmen – und irgendwann die Konsequenzen ihres Handelns zu spüren bekommen. Wir widmen uns Antitrends und Mythen, stellen Entwicklungen im und rund ums Internet in Frage, wägen ab. Denn wir sind fest davon überzeugt: ...
…
continue reading
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
…
continue reading
1
How To Measure Inclusion and Equality. Overcoming Bias in Cyber
45:50
45:50
Afspil senere
Afspil senere
Lister
Like
Liked
45:50
NEW! Text Us Direct Here! How Equality Is Addressed in Cyber Security Field. We talk head-on about how equality is addressed in cyber security field. We address:, inequality in cyber security, ways to stop bias in cyber security, and the glass ceiling in cyber security. Lynn Dohm, head of Women in Cyber Security (WiCyS) and one of the top women in …
…
continue reading
1
Einmal Porno-Maschinenraum und zurück
49:15
49:15
Afspil senere
Afspil senere
Lister
Like
Liked
49:15
Im Gespräch mit Journalist Sebastian Meineck +++++++ Links +++++++ 👉Sebastian Meineck Journalist für Tech und Investigation https://sebastianmeineck.wordpress.com/ 👉Netzpolitik.org netzpolitik.org ist ein Medium für digitale Freiheitsrechte. Wir thematisieren die wichtigen Fragestellungen rund um Internet, Gesellschaft und Politik und zeigen Wege a…
…
continue reading
1
$25 Million in Ethereum Stolen from Trading Bots
5:38
5:38
Afspil senere
Afspil senere
Lister
Like
Liked
5:38
Ethereum is a popular cryptocurrency, and some have started using bots to frontrun. Two brothers learned how they could exploit a vulnerability in these bots and make themselves $25 million richer. Sources: https://pastebin.com/xuQZ1ardAf Chloe Thonus
…
continue reading
1
Phone Rings. It's A Social Engineer Callling.
1:00:45
1:00:45
Afspil senere
Afspil senere
Lister
Like
Liked
1:00:45
NEW! Text Us Direct Here! Video Episode: https://youtu.be/oH7FpvHOhVA This is the story of Matt Smallman, author of “Unlocking Your Call Centre”, about how call centers can be security risks. Our discussion gives exclusive insight into how biometrics fail in security, problems with voice authentication and explore military tactics and biometrics. W…
…
continue reading
1
Customers or Enemies Online.
1:04:09
1:04:09
Afspil senere
Afspil senere
Lister
Like
Liked
1:04:09
NEW! Text Us Direct Here! Richard Hollis of Risk Crew in London joins Cyber Crime Junkies studio discussing key topics: why cybersecurity efforts usually fail and customers or enemies online. Video episode: https://youtu.be/QQ8l1PaDaUI Topics: 💡how cybersecurity efforts usually fail, 💡customers or enemies online 💡best practices for businesses to li…
…
continue reading
1
Dell Breach Exposed Data of 49 Million Customers
7:09
7:09
Afspil senere
Afspil senere
Lister
Like
Liked
7:09
Dell is a massive provider of technology for organizations and home users alike, and although on first glance their data breach seems not to contain sensitive data it has likely opened the floodgates for scams and phishing opportunities. Sources: https://pastebin.com/6jSYQM4PAf Chloe Thonus
…
continue reading
1
Zero Trust, SMB & National Security. INTEL CTO Exclusive.
1:04:09
1:04:09
Afspil senere
Afspil senere
Lister
Like
Liked
1:04:09
NEW! Text Us Direct Here! Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. St…
…
continue reading
1
New Approaches to Enter the Cybersecurity Field
54:10
54:10
Afspil senere
Afspil senere
Lister
Like
Liked
54:10
NEW! Text Us Direct Here! Sam Buckenmaier, a senior cyber leader, join us on what leadership means today and what employers want in cybersecurity. We discussed: new approaches to enter the cybersecurity field, how to have effective communication internally in business, advice on cybersecurity careers from top recruiters, approaches to enter cyberse…
…
continue reading
1
New Insight on True Cyber Crime Examples.
57:09
57:09
Afspil senere
Afspil senere
Lister
Like
Liked
57:09
NEW! Text Us Direct Here! What we all need to know about How Psychology Affects Security. Psychology of Online Security. Topics: behind scenes cyber criminals, best ways to protect business from cyber crime, cyber crime gang discussions, exposing cyber crime gangs, exposing secrets of cyber crime gangs, how can we spot fraud in business, how to lim…
…
continue reading
1
Cyber Crime Take Down Story. LOCKBIT.
55:45
55:45
Afspil senere
Afspil senere
Lister
Like
Liked
55:45
NEW! Text Us Direct Here! Video Episode here! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Background 08:10 Financial Aspects of…
…
continue reading
1
Fake USPS Sites Get Almost the Same Traffic as the Real One
7:53
7:53
Afspil senere
Afspil senere
Lister
Like
Liked
7:53
With online shopping being so popular, getting delivery updates is not so uncommon, but this has led to the rise of a prolific scam that is much bigger than you may think. Sources: https://pastebin.com/mW6kWtWxAf Chloe Thonus
…
continue reading
1
Digital Porn: Es ist nicht alles Sex, was glänzt
27:03
27:03
Afspil senere
Afspil senere
Lister
Like
Liked
27:03
Zwischen Demokratisierung und Dämonisierung +++++++ Links +++++++ 👉Wikipedia: Behind the Green Door (2024) Behind the Green Door (deutsch: Hinter der grünen Tür) ist ein US-amerikanischer Pornofilm von Artie und James Mitchell mit Marilyn Chambers als Hauptdarstellerin, der wie der Film Deep Throat zu den Klassikern der Pornografie zählt; er löste …
…
continue reading
1
Impact of AI on Business Cyber Risk
1:12:33
1:12:33
Afspil senere
Afspil senere
Lister
Like
Liked
1:12:33
NEW! Text Us Direct Here! Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch a Phish…
…
continue reading
1
Cloudbleed and the Vitality of Cloud Security
8:04
8:04
Afspil senere
Afspil senere
Lister
Like
Liked
8:04
The cloud is ever expanding and allowing people to easily scale up at rates previously impossible. However one thing that must be considered is that security becomes complicated. You have to really trust your cloud provider to hold up their end, and even trusted providers can have oversights. Sources: https://pastebin.com/2LJPjrVx…
…
continue reading
1
Innovative Ways to Reduce Website Spoofing
1:01:53
1:01:53
Afspil senere
Afspil senere
Lister
Like
Liked
1:01:53
NEW! Text Us Direct Here! After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing. Key Topi…
…
continue reading
NEW! Text Us Direct Here! The US has signed into new law the Ban of Tik Tok effective in January. What does this mean? Topics: US Tik Tok ban. What to know, online privacy andTik Tok, national security risks from social media, identity protection in light of TikTok, why social media platforms are national security risks, why social media platform i…
…
continue reading
1
Threat Actors Bribing Mobile Carriers into SIM Swapping
6:22
6:22
Afspil senere
Afspil senere
Lister
Like
Liked
6:22
MFA is becoming more and more common, but with every security innovation, threat actors figure out ways around them. Recently it came out that an unknown actor was bribing employees at T-Mobile and Verizon to perform SIM swapping attacks, which can compromise SMS based MFA codes. Sources: https://pastebin.com/h47Mijdt…
…
continue reading
1
How Secrets in Hostage Negotiation created Never Split The Difference. Pt 2.
30:29
30:29
Afspil senere
Afspil senere
Lister
Like
Liked
30:29
NEW! Text Us Direct Here! Chris Voss joins us to go INSIDE the famous negotiation model he created and share secrets behind Never Split the Difference, from the #1 Wall Street Journal best-selling book on Negotiation. Chris is the most decorated FBI hostage negotiator in history. He teaches his techniques at Harvard Law, Georgetown University, and …
…
continue reading
1
Inside Story of Chris Voss and Never Split The Difference Pt 1
37:58
37:58
Afspil senere
Afspil senere
Lister
Like
Liked
37:58
NEW! Text Us Direct Here! Chris Voss, founder of the Black Swan Group, joins us to share the story behind Never Split The Difference, the #1 Wall Street Journal best selling book on Negotiation. The most decorated FBI hostage negotiator in history, Chris Voss teaches his model Harvard Law, Georgetown University and others. Key Takeaways how never s…
…
continue reading
1
How to Save Yourself. Ransomware, Back ups and more.
1:01:12
1:01:12
Afspil senere
Afspil senere
Lister
Like
Liked
1:01:12
NEW! Text Us Direct Here! Great discussion with Gabe Gambill. VP with Quorum. Topics discussed: best ways to limit cyber attack liability, brand protection with identification authentication, how to limit liability from cyber attacks, newest findings on ransomware cyber crime gangs, undercover findings on ransomware cyber crime gangs, pitfalls of d…
…
continue reading
1
How AI Is Effecting Brand Imagination
59:53
59:53
Afspil senere
Afspil senere
Lister
Like
Liked
59:53
NEW! Text Us Direct Here! When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss: · ways to grow brands …
…
continue reading
1
Lawyer's Unleashed. Top Ways to Reduce Risk in Cyber Breach Litigation.
1:06:26
1:06:26
Afspil senere
Afspil senere
Lister
Like
Liked
1:06:26
NEW! Text Us Direct Here! Jamey Davidson, Partner at international law firm O’Hagan Meyer (https://ohaganmeyer.com). Jamey concentrates on top ways to reduce risk in cyber breach litigation, defending businesses in cyber breach class-action law suits and how to build defenses to reduce cyber breach liability. We discuss: · How Cyber Breach Litigati…
…
continue reading
Die digitale Evolution der Intimität +++++++ Links +++++++ 👉 Ray Tomlinson sends the first email (2024) 1971Ray Tomlinson sends the first email https://www.computinghistory.org.uk/det/6116/First-e-mail-sent-by-Ray-Tomlinson/ 👉 Geschichte Von Jason (2021) Statistiken zur Pornosucht https://blockerx.net/de/blog/geschichte-von-jason/ 👉 ASCII-Porn: Die…
…
continue reading
1
Staffel 7: Eine etwas andere Lustreise
7:09
7:09
Afspil senere
Afspil senere
Lister
Like
Liked
7:09
Darum geht's diesmalSeit seinen Anfangstagen hat das Internet einen Dauer-Untermieter: den Sex. Ob Porno-Content, Sextoy-Vertrieb, Erotik-Chats: Alles, was die Lust anheizt, findet früher oder später seinen Weg ins Netz bzw. vermengt sich mit neuen Technologien. Doch nicht immer steht am Ende der Wertschöpfungskette die Lust. Ausbeutung, Menschenha…
…
continue reading
NEW! Text Us Direct Here! From Rupert Murdoch's global entertainment ambition to a dead hacker found hanging from a tree in a park in Germany, this true cyber crime story spans over a decade in the cut-throat Satellite TV wars, involving colorful characters, pirates, big business, technology advances and failures and those who entered the darker si…
…
continue reading
1
Storm Worm: The Malware that Took Down Warnings of Itself
7:48
7:48
Afspil senere
Afspil senere
Lister
Like
Liked
7:48
In 2007 clickbait emails could make you part of a botnet that silenced cybersecurity professionals and performed attacks for anyone on the dark web willing to pay. Not a worm, but a Trojan, this is how the Storm Worm was ahead of its time. Sources: https://pastebin.com/nPbinx0iAf Chloe Thonus
…
continue reading
1
The Story Behind the Sony Data Breach 2014
50:33
50:33
Afspil senere
Afspil senere
Lister
Like
Liked
50:33
NEW! Text Us Direct Here! This is the True Cyber Crime Story of “The Day the Lights Went Out at Sony Pictures” in 2014. Discussion about then events, what led to it, the formal findings and open questions remaining by experts. Hosts David Mauro and Mark Mosher explore their research with Special Guest, professional coach Rich Moore. Summary The con…
…
continue reading
1
New Ways to Take Control Over Data Privacy with Kurt Long.
59:32
59:32
Afspil senere
Afspil senere
Lister
Like
Liked
59:32
NEW! Text Us Direct Here! Kurt Long CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage. We discuss new approaches to safe and private messaging apps, how to keep criminals out of your private data, and why online privacy is important to freedom. Chapter…
…
continue reading
1
Modern Ways to Improve Presentation Skills with Nausheen Chen.
54:04
54:04
Afspil senere
Afspil senere
Lister
Like
Liked
54:04
NEW! Text Us Direct Here! Nausheen Chen joins us. She is a wildly popular professional public speaking coach with clients like leaders at Google, Amazon and huge brands like Timberland and more. Check out her site:www.speaking.coach Nausheen has a free course we encourage you to check out! https://www.speaking.coach/free-course/ She shares her insi…
…
continue reading
1
Password Stuffing: Why you Should Use Unique Passwords for Every Site
10:42
10:42
Afspil senere
Afspil senere
Lister
Like
Liked
10:42
There's a reason you should use a unique password for every website you use, but most people simply don't. How are you supposed to make and remember dozens of passwords for each site that are completely unique and can't be written down? What if I told you it doesn't have to be that difficult?Af Chloe Thonus
…
continue reading
1
New Ways to Reduce Risks from Deep Fake
39:29
39:29
Afspil senere
Afspil senere
Lister
Like
Liked
39:29
NEW! Text Us Direct Here! Are you real? What will Deepfake do to Security Risk? Shocking Examples. Summary In this conversation, Dino Mauro and Mark Mosher discuss the rise of deepfake technology and its implications for individuals, families, and organizations. They explore the real-world applications of deepfake, the advancements in technology, a…
…
continue reading