Download the App!
show episodes
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

Unsubscribe
Unsubscribe
Haftalık+
 
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
Artwork

1
How Hacks Happen

Many Worlds Productions

Unsubscribe
Unsubscribe
Aylık
 
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
  continue reading
 
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
  continue reading
 
Join us as we unleash the latest innovations in science and tech to showcase engineering that is saving our planet and helping communities across the globe. From shark detection technology and artificial reefs bringing back marine wildlife, to the latest real-life cyber crime, nano materials and smart watches are saving lives, you can get thinking about what will be next. Kick start your way to making a difference and engineering a better world. Join us on social media @IETeducation for all ...
  continue reading
 
Artwork

1
Naked City

The Age and Sydney Morning Herald

Unsubscribe
Unsubscribe
Aylık
 
Take a journey into the dark depths of the Australian criminal underworld with Australia’s most formidable crime reporter - John Silvester.
  continue reading
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Meet Alice – a burnt-out barista who turns to the Dark Web to pay off her student debt. But when cybercrime pulls her deeper than she could have ever imagined, only one question remains: can Alice get out before it’s too late? The Hacker Chronicles Season 2: Digital Nomad. Presented by Tenable. Starring Michael C. Hall as John Doe. And Chloe Taylor as Alice.
  continue reading
 
It aims at creating awareness around hackers stealing financial information and how cyber crime continues to evolve, with new threats surfacing every year. They can, in effect, destroy businesses and damage your financial and personal lives — especially if you’re the victim of identity theft. Cyber attacks are an evolving danger to organizations, employees and consumers. They may be designed to access or destroy sensitive data or extort money. At Hidden Files, hope listeners will be able to ...
  continue reading
 
“DarkWeb.Today – Hackers & Cyber Security” is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that are central to our ...
  continue reading
 
Artwork

1
The Impact: Coronavirus and Organized Crime

Global Initiative Against Transnational Organized Crime

Unsubscribe
Unsubscribe
Aylık
 
The Impact: Coronavirus and Organized Crime is a special edition weekly podcast from the Global Initiative Against Transnational Organized Crime. We'll look at how the ongoing COVID-19 virus is impacting on organized crime around the world and how the illicit economy may affect our ability to respond to the virus. We'll be covering cyber crime, the illegal wildlife trade, counterfeit medicines, drug trafficking, human smuggling, corruption and human trafficking. This podcast uses the followi ...
  continue reading
 
Hello! This is the Aware and Prepared podcast. I'm your host, Mandi Pratt, a trained domestic violence advocate. I teach women and vulnerable populations how to be street smart. I'm a mom with a gnarly backstory from almost two decades ago. The FBI showed up at my door one day to alert me that my abusive ex had become wanted for multiple bank robberies. Our story was in the news (a few times). I was tired of feeling vulnerable and learned how to keep myself and my son safer.I wish when I was ...
  continue reading
 
Artwork

1
The Cyber Brief Podcast

National Cybersecurity Center

Unsubscribe
Unsubscribe
Aylık
 
The CyberBrief Podcast uncovers the latest cyber attacks, hacks, and stories that matter. Cyber crimes are growing exponentially, with many of the latest attacks & hacks being the biggest in history and costing billions of dollars. But what can we as cyber professionals, business leaders, or just people living in a digital age do? In this series, we’ll dive into the history of cybersecurity, some of the top hacks and scams in cyber, and what we can do about it. To mark Cybersecurity Awarenes ...
  continue reading
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
  continue reading
 
Artwork

1
Security So What!

Michael Ferguson

Unsubscribe
Unsubscribe
Aylık
 
Australian businesses were targeted with more advanced malware and cyber intrusions in 2014 than any other. We believe its time for Australian organisations to realize that we are firmly in the cross-hairs of global cyber criminals. This blog and podcast is so we can provide a platform to share stories of cyber crime from Australia and the rest of the world, and hopefully find ways Australian businesses can protect their organisation, customers and employees data from these threats.
  continue reading
 
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
  continue reading
 
In a world where we are so dependent on our phones, our computers and the internet, we explore what happens when you don't protect yourself online. Criminal Domain will expose the ways we leave ourselves open to potential hacking and phishing attacks, and how perpetrators use technology to manipulate us. World renowned futurist Mark Pesce and respected investigative journalist Claire Aird speak to victims of cyber crime to inform us how to better protect ourselves online.
  continue reading
 
Artwork

1
Decoding Security

Microsoft Australia

Unsubscribe
Unsubscribe
Aylık+
 
Decoding Security is a podcast from Microsoft Australia about how to protect your business from the ever changing threat of cyber crime. On the show, you’ll hear from leaders in cybersecurity, as well as Microsoft experts, as we break down strategies to help keep your business secure. From identifying threats, to managing incidents — we’ll crack the code to help you stay resilient, agile and competitive.
  continue reading
 
A riveting, original and comprehensive account of international crime and a brilliant critique of globalisation's dark side, McMafia contains full and often terrible stories behind today's most sensational headlines, charting a parallel universe of crime. Find out more at www.bodleyhead.co.uk.
  continue reading
 
Artwork

1
FINCast

K2 Integrity

Unsubscribe
Unsubscribe
Aylık
 
FINCast is an exciting hub of conversation encompassing the world's most pressing financial integrity-related issues, including anti-money laundering/counter-terrorist financing (AML/CFT), anti-bribery and corruption, financial and cyber crime vulnerabilities, and fin-tech and new technologies.
  continue reading
 
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
  continue reading
 
Artwork

1
Compensating Controls

James Keeling on Podiobooks.com

Unsubscribe
Unsubscribe
Aylık
 
Nicholas Edgwood rides a wave of good karma–a job he excels at, a new girlfriend, and a bright future. When he gets framed for a cyber-crime he did not commit, he must run for his life while his entire world crumbles around him. Betrayal and murder replace peace and hope as he finds himself in unfamiliar territory. He may not be the biggest and baddest guy out there, but he has skills, the kind garnered from a career steeped in computers and code. Now he must leverage these skills to their f ...
  continue reading
 
Roughly once every 37 seconds, someone on earth falls victim to Cyber Crime. At least, that's what our most recent google search indicated. It's difficult to rationalize just how large the internet is, and can be even harder to truly understand just how important it is to stay safe in such a hostile environment. If nothing else, The Incident Handler's Guide to the Galaxy aims to equip its listeners with tools and real-world stories, offering a deeper dive into current events, tips, tricks an ...
  continue reading
 
Artwork

1
Info Matters

Information and Privacy Commissioner of Ontario

Unsubscribe
Unsubscribe
Aylık
 
Conversations about people, privacy, and access to information. Hosted by Patricia Kosseim, Information and Privacy Commissioner of Ontario.
  continue reading
 
Artwork

1
Cyber Cafe

Lesline Gilzene

Unsubscribe
Unsubscribe
Günlük+
 
Embark on a riveting journey into the heart of the cybersecurity career with host Lesline Gilzene, as she immerses you in the exploration of data breaches, incident response, and captivating real-world cybercrime narratives, uncovering the thriving stories of those on the front line of digital defense.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Loading …
show series
 
In this episode of "Reimagining Cyber," host Rob Aragao interviews Craig Jones, the former Director of the Global Cyber Crimes Directorate at Interpol. Jones provides a comprehensive overview of Interpol's role in combating cybercrime, emphasizing its unique position as a non-executive body that facilitates international law enforcement collaborati…
  continue reading
 
David Mauro interviews Mike Acerra, the president and founder of Luxblox, about AI and its role in humanity. They discuss the evolution of technology, from typewriters to computers, and the impact of AI on various industries. Mike shares the story of how Luxblox was created and how it encourages creativity and problem-solving. They also touch on th…
  continue reading
 
The city of Columbus, Ohio had a data breach occur in July. According to the mayor, the information leaked was nothing important to hackers. A security researcher proved that this was not the case, that the data was incredibly sensitive. In response, the city sued him. Sources: https://pastebin.com/C632hthD…
  continue reading
 
Join me and my guest for a very informative discussion: Marie E. Smith, CFE Special Agent Financial Crime Investigations Unit North Carolina State Bureau of Investigation https://www.ncsbi.gov/ Join us in the Caregiving Connections Community: Live Caregiver Discussion and Support - Every 2nd and 4th Wednesday of the month @ - 6pm (EST) Zoom Meeting…
  continue reading
 
Send us a text Financial sextortion occurs when someone is blackmailed after sharing intimate photos or videos online, often with someone they believe to be a trusted friend or partner. The episode shares info from EndTab.org highlighting chilling statistics, with most victims being young men and boys. This has tragic results. We also explore how t…
  continue reading
 
Cadet Blizzard is part of Russia’s elite GRU Unit. Apache releases a security update for its open-source ERP system. SonicWall has issued an urgent advisory for a critical vulnerability. Researchers uncover a novel technique exploiting Linux’s Pluggable Authentication Modules. Google’s kCTF team has discloses a critical security vulnerability affec…
  continue reading
 
The DOJ disrupts Russia’s Doppelganger. NSA boasts over 1,000 public and private partners. The FBI warns of North Korean operatives launching “complex and elaborate” social engineering attacks. Iran pays the ransom to sure up their banking system. Cisco has disclosed two critical vulnerabilities in its Smart Licensing Utility. A Nigerian man gets f…
  continue reading
 
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of how the ease of registering an LLC in Colorado has led to a surge in fraudulent businesses. She discusses how residents receiving suspicious mail addressed to fake LLCs registered at their homes are overwhelming the state's Secretary of State with thous…
  continue reading
 
Researchers find Yubikeys vulnerable to cloning. Google warns of a serious zero-day Android vulnerability. Zyxel releases patches for multiple vulnerabilities. D-Link urges customers to retire unsupported vulnerable routers. Hackers linked to Russia and Belarus target Latvian websites. The Federal Trade Commission (FTC) reports a sharp rise in Bitc…
  continue reading
 
Telegram puts End-to-End Privacy in the Crosshairs Free security logging is good for everyone CrowdStrike hemorrhaging customers Microsoft to meet privately with EDR (Endpoint Detection & Response) vendors Yelp's Unhappy with Google Telegram as the hotbed for DDoSass – DDoS as a Service Chrome grows more difficult to exploit Cox Media Group's "Acti…
  continue reading
 
Telegram puts End-to-End Privacy in the Crosshairs Free security logging is good for everyone CrowdStrike hemorrhaging customers Microsoft to meet privately with EDR (Endpoint Detection & Response) vendors Yelp's Unhappy with Google Telegram as the hotbed for DDoSass – DDoS as a Service Chrome grows more difficult to exploit Cox Media Group's "Acti…
  continue reading
 
Brazil blocks access to X/Twitter. Transport for London has been hit with a cyberattack. Threat actors have poisoned GlobalProtect VPN software to deliver WikiLoader. “Voldemort” is a significant international cyber-espionage campaign. Researchers uncover an SQL injection flaw with implications for airport security. Three men plead guilty to runnin…
  continue reading
 
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
  continue reading
 
In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber re…
  continue reading
 
Send us a text Intuition is a survival tool that helps us sense danger by picking up on subtle clues from our surroundings. Mandi shares a practical example of being alone at a gas station at night, explaining how these gut feelings can guide us to take protective actions, such as the ones she shared. Mandi also highlights that intuition isn't just…
  continue reading
 
You can learn more about AWS in Orbit at space.n2k.com/aws. Our guests today are Jason Aspiotis, Global Director, In-Space Data & Security at Axiom Space and Jay Naves, Sr. Solutions Architect at AWS Aerospace & Satellite Solutions. AWS in Orbit is a podcast collaboration between N2K Networks and AWS to offer listeners an in-depth look at the trans…
  continue reading
 
Titania Jordan. Best-selling author, CMO of Bark, and regular TV Guest on national TV shows, Titania Jordan, joins us to discuss Parenting in a Tech World. We discuss: Common misconceptions and Parental Challenges today The Role and Responsibilities Social Media companies have and should have Best Practices and Practical Suggestion to manage the te…
  continue reading
 
Bryan Seely joins us is a refreshing and hilariously entertaining episode. Bryan is a world-famous cyber security expert, ethical hacker and former U.S. Marine. He is known for his book (Web of Lies) and for intercepting calls to the U.S. Secret Service & FBI, as well as finding major exploits at LinkedIn and several government 3-Letter agencies. C…
  continue reading
 
Enjoy this encore episode with Vice President of Security and Support Operations of Alert Logic Tom Gorup shares how his career path led him from tactics learned in Army infantry using machine guns and claymores to cybersecurity replacing the artillery with antivirus and firewalls. Tom built a security automation solution called the Grunt (in recol…
  continue reading
 
In this Special Edition podcast, N2K's Executive Editor Brandon Karpf speaks with Danielle Ruderman, Senior Manager for Wordwide Security Specialists at AWS, and Adam Mikeal, CISO at Texas A&M, about CISO Circles, security challenges faced in higher education, and fostering the culture of security. Learn more about your ad choices. Visit megaphone.…
  continue reading
 
We find out the intricate processes involved in chocolate production, highlighting the role of various engineers—mechanical, electrical, and software—in designing and automating chocolate manufacturing systems... Join Fun Kids Podcasts+: https://funkidslive.com/plus See omnystudio.com/listener for privacy information.…
  continue reading
 
Loading …

Hızlı referans rehberi