If you can never get enough true crime... Congratulations, you’ve found your people.
…
continue reading
Deep dive into true crime… where real life can be stranger than fiction! Let me know if there’s any cases you’d like to hear about! You can reach me at TrueCrimeJunkie01@gmail.com
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Home of the Vigilance Newsletter, the latest Cyber News from the Dark web, research and insider info. We interview Leaders, share True Cyber Crime and provide advice on how to advance your career. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Hey there, Tax Crime Junkies! For those of you who are new to our show, Tax Crime Junkies is the true crime podcast that combines our love of taxes and crime, and we’re here to bring you the inside scoop on some of the most fascinating tax-related cases out there. As tax experts and practitioners ourselves, Dom and Tom are uniquely qualified to uncover the most intricate details of these cases, and we’re not afraid to go deep. We know the ins and outs of the tax system, and we’re passionate ...
…
continue reading
A deep-dive into Netflix's Abducted in Plain Sight Cover art photo provided by David von Diemar on Unsplash: https://unsplash.com/@davidvondiemar
…
continue reading
Scammers have an infinite number of ways to steal your money and information. In this episode, we explore and expose several scams that have impacted our listeners. Be sure to check out our new webpage Am I Getting Scammed? for a full list of tips to reference if something or someone ever feels off to you. To watch the full Ask Amy episode and hear…
…
continue reading
1
Impact of AI on Business Cyber Risk
1:10:53
1:10:53
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:10:53
Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch a Phish nick@thenetdefender.com h…
…
continue reading
1
INTRODUCING: Crime Junkie AF
1:03:38
1:03:38
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:03:38
Have you heard yet? Your newest obsession and the ultimate destination for 24/7 true crime, Crime Junkie Radio, is here and exclusive to SiriusXM’s app! On Crime Junkie Radio, you’ll hear episodes from not only Crime Junkie, but from some of our other chart-topping titles like The Deck. But the best part is… it will be the home for our brand-new sh…
…
continue reading
1
Innovative Ways to Reduce Website Spoofing
1:00:14
1:00:14
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:00:14
After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing. Key Topics: new ways to reduce cyb…
…
continue reading
The US has signed into new law the Ban of Tik Tok effective in January. What does this mean? Topics: US Tik Tok ban. What to know, online privacy andTik Tok, national security risks from social media, identity protection in light of TikTok, why social media platforms are national security risks, why social media platform is a national security thre…
…
continue reading
1
Episode 38 Charities, Tax Shelters, and Crimes...Oh My! The story of Michael L Meyers and the Ultimate Tax Plan
29:34
29:34
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
29:34
Show Notes for Episode 38: Charities, Tax Shelters, and Crimes...Oh My! Hosts: Dominique Molina and Tom Gorczynski Summary In this episode of "Tax Crime Junkies," we delve into the shady dealings of Michael L. Meyer and his notorious "Ultimate Tax Plan." Discover how Meyer, posing as a trustworthy professional, lured financial planners and their we…
…
continue reading
When 27-year-old Scott Johnson is found deceased at the bottom of a cliff in Australia, authorities are quick to rule his death as a suicide. However, his brother, Steve, isn’t convinced, and begins a multi-decade quest to get answers – and justice. Please take a minute to check out these resources and organizations in support of the LGBTQ+ communi…
…
continue reading
1
How Secrets in Hostage Negotiation created Never Split The Difference. Pt 2.
30:06
30:06
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
30:06
Chris Voss joins us to go INSIDE the famous negotiation model he created and share secrets behind Never Split the Difference, from the #1 Wall Street Journal best-selling book on Negotiation. Chris is the most decorated FBI hostage negotiator in history. He teaches his techniques at Harvard Law, Georgetown University, and others. He is the founder …
…
continue reading
1
Inside Story of Chris Voss and Never Split The Difference Pt 1
37:36
37:36
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
37:36
Chris Voss, founder of the Black Swan Group, joins us to share the story behind Never Split The Difference, the #1 Wall Street Journal best selling book on Negotiation. The most decorated FBI hostage negotiator in history, Chris Voss teaches his model Harvard Law, Georgetown University and others. Key Takeaways how never split the difference starte…
…
continue reading
1
How AI Is Effecting Brand Imagination
58:14
58:14
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
58:14
When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss: · ways to grow brands by adapting to emerging te…
…
continue reading
1
How to Save Yourself. Ransomware, Back ups and more.
59:33
59:33
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
59:33
Great discussion with Gabe Gambill. VP with Quorum. Topics discussed: best ways to limit cyber attack liability, brand protection with identification authentication, how to limit liability from cyber attacks, newest findings on ransomware cyber crime gangs, undercover findings on ransomware cyber crime gangs, pitfalls of data back ups, how to reduc…
…
continue reading
1
Lawyer's Unleashed. Top Ways to Reduce Risk in Cyber Breach Litigation.
1:04:47
1:04:47
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:04:47
Jamey Davidson, Partner at international law firm O’Hagan Meyer (https://ohaganmeyer.com). Jamey concentrates on top ways to reduce risk in cyber breach litigation, defending businesses in cyber breach class-action law suits and how to build defenses to reduce cyber breach liability. We discuss: · How Cyber Breach Litigation Works · Why Security La…
…
continue reading
From Rupert Murdoch's global entertainment ambition to a dead hacker found hanging from a tree in a park in Germany, this true cyber crime story spans over a decade in the cut-throat Satellite TV wars, involving colorful characters, pirates, big business, technology advances and failures and those who entered the darker side to try and get what the…
…
continue reading
1
MYSTERIOUS DEATH OF: Franchesca Alvarado
46:40
46:40
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
46:40
When 22-year-old Franchesca Alvarado set out on a quick weekend trip to Atlantic City in March of 2012, it was meant to be a simple getaway… but it spiraled into a baffling tragedy. Her family is hoping that someone out there has the answers they’ve been searching for. If you have any information about Franchesca Alvarado, please contact the New Je…
…
continue reading
1
The Story Behind the Sony Data Breach 2014
48:54
48:54
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
48:54
Cyber Crime Junkies by David Mauro tarafından oluşturuldu
…
continue reading
1
New Ways to Take Control Over Data Privacy with Kurt Long.
57:53
57:53
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
57:53
Kurt Long CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage. We discuss new approaches to safe and private messaging apps, how to keep criminals out of your private data, and why online privacy is important to freedom. Chapters 01:09 Kurt Long's Work a…
…
continue reading
1
Modern Ways to Improve Presentation Skills with Nausheen Chen.
52:25
52:25
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
52:25
Nausheen Chen joins us. She is a wildly popular professional public speaking coach with clients like leaders at Google, Amazon and huge brands like Timberland and more. Check out her site:www.speaking.coach Nausheen has a free course we encourage you to check out! https://www.speaking.coach/free-course/ She shares her insights on modern ways to imp…
…
continue reading
1
Episode 37 JUST WHEN YOU THINK YOU KNOW A PERSON: ALAN FABIAN’S SAVVY SCHEME
36:28
36:28
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
36:28
Show Notes for Tax Crime Junkies: "Just When You Think You Know a Person: Alan Fabian’s Savvy Scheme" Episode Summary: In this eye-opening episode of Tax Crime Junkies, your hosts Dominique and Tom delve into the complex and shocking world of Alan Fabian. A seemingly perfect citizen, family man, and business mogul, Alan's life took a dark turn into…
…
continue reading
A young man stops for a restroom break during a walk with his mom along the seaside in the United Kingdom and is never seen again. His family has been searching for him for over 30 years… If you have information regarding Steven Clark’s case and you’re in the U.K., you can speak to the cold case team directly by dialing 101. Or you can remain anony…
…
continue reading
1
New Ways to Reduce Risks from Deep Fake
39:06
39:06
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
39:06
Are you real? What will Deepfake do to Security Risk? Shocking Examples. Summary In this conversation, Dino Mauro and Mark Mosher discuss the rise of deepfake technology and its implications for individuals, families, and organizations. They explore the real-world applications of deepfake, the advancements in technology, and the dangers it poses in…
…
continue reading
1
How Deep Fake Videos Increase Security Risks.
1:13:24
1:13:24
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
1:13:24
Paul Eckloff was a US Secret Service Agent for 23 years. Today we discuss how deep fake videos increase security risks. Topics include: artificial intelligence risks in cyber, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, and how is ai making it harder to detect deep fa…
…
continue reading
1
MURDERED: María Marta García Belsunce Part 2
29:08
29:08
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
29:08
When tragedy strikes in a wealthy Argentinian community, the suspicions of the nation fall squarely on the victim’s own family, and the case takes on a life of its own. This is Part 2 of 2. Source materials for this episode cannot be listed here due to character limitations. For a full list of sources, please visit: crimejunkiepodcast.com/murdered-…
…
continue reading
This April Fool's Day, "Tax Crime Junkies" takes a detour from the usual maze of numbers and legal intrigue to bring you something completely different—a bonus episode packed with our most hilarious bloopers! Join Dom and Tom as they let their guard down and share the moments that didn't make the cut. From tongue-tied explanations of tax legislatio…
…
continue reading
1
MURDERED: María Marta García Belsunce Part 1
43:19
43:19
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
43:19
When tragedy strikes in a wealthy Argentinian community, the suspicions of the nation fall squarely on the victim’s own family, and the case takes on a life of its own. This is Part 1 of 2. Listen to Part 2 NOW in the Fan Club! Source materials for this episode cannot be listed here due to character limitations. For a full list of sources, please v…
…
continue reading
1
New Ways Leaders Can Assess Their Risk Appetite
54:11
54:11
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
54:11
In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite. KEY TOPICS: · how risk appetite effects your cyber security plans, · explaining risk appetite in cyber security to leadership, · how security planning involves risk appetite, · new ways leaders can assess the…
…
continue reading
1
Top Cyber Risks in Higher Education
58:17
58:17
Daha Sonra Çal
Daha Sonra Çal
Listeler
Beğen
Beğenildi
58:17
John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss …
…
continue reading
Details explained on blockbuster new episodes coming, weekly live-streams and our new Webinar series starts April 30th. Find details at www.CyberCrimeJunkies.com Key topics: Effective ways to protect business from cyber crime, How employees can create insider threats, How intelligence gathering is critical to security, How to stop social engineerin…
…
continue reading