Cyber Crimes public
[search 0]
More
Download the App!
show episodes
 
Artwork
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies-David Mauro

Unsubscribe
Unsubscribe
Weekly+
 
Socializing Cybersecurity. Translating Cyber into business terms. Home of the Vigilance Newsletter, the latest Cyber News from the Dark web, research and insider info. We interview Leaders, share True Cyber Crime and provide advice on how to advance your career. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
  continue reading
 
It aims at creating awareness around hackers stealing financial information and how cyber crime continues to evolve, with new threats surfacing every year. They can, in effect, destroy businesses and damage your financial and personal lives — especially if you’re the victim of identity theft. Cyber attacks are an evolving danger to organizations, employees and consumers. They may be designed to access or destroy sensitive data or extort money. At Hidden Files, hope listeners will be able to ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Cyber Uncut

Momentum Media

Unsubscribe
Unsubscribe
Monthly+
 
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
  continue reading
 
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
  continue reading
 
Meet Alice – a burnt-out barista who turns to the Dark Web to pay off her student debt. But when cybercrime pulls her deeper than she could have ever imagined, only one question remains: can Alice get out before it’s too late? The Hacker Chronicles Season 2: Digital Nomad. Presented by Tenable. Starring Michael C. Hall as John Doe. And Chloe Taylor as Alice.
  continue reading
 
Join us as we unleash the latest innovations in science and tech to showcase engineering that is saving our planet and helping communities across the globe. From shark detection technology and artificial reefs bringing back marine wildlife, to the latest real-life cyber crime, nano materials and smart watches are saving lives, you can get thinking about what will be next. Kick start your way to making a difference and engineering a better world. Join us on social media @IETeducation for all ...
  continue reading
 
Artwork

1
FINCast

K2 Integrity

Unsubscribe
Unsubscribe
Monthly
 
FINCast is an exciting hub of conversation encompassing the world's most pressing financial integrity-related issues, including anti-money laundering/counter-terrorist financing (AML/CFT), anti-bribery and corruption, financial and cyber crime vulnerabilities, and fin-tech and new technologies.
  continue reading
 
Webby-nominated "What the Hack with Adam Levin" is true cybercrime with dad jokes. It’s a no-shame zone for anyone who’s ever been scammed, hacked, phished or cyber-bushwhacked. Every week, we feature fascinating people talking about the terrifying, annoying, embarrassing, or infuriating things they’ve experienced online. Join consumer affairs veteran Adam Levin with co-hosts Beau “Hack Me” Friedlander and Travis “Here's What Actually Happened” Taylor for a good story and tips on how to make ...
  continue reading
 
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
  continue reading
 
Reformed Hacker Bastien Treptel and the Team at CTRL Group take us through managing our cyber risks and security in an age where cyber-attacks can be carried out with ease. Detailing risks in the Start-Up, SME industries and cloud services as well as giving us an insight into how secure we are in our very own homes. For more episodes download the free LiSTNR app
  continue reading
 
Artwork

1
Berlin Security Beat

David Backovsky, Centre for International Security at the Hertie School

Unsubscribe
Unsubscribe
Monthly
 
The Berlin Security Beat is an original podcast produced by the Centre for International Security at the Hertie School in Berlin. It delves into the intricate world of international security, examining its ties to research, academia, and various career paths, spanning areas from nuclear to cyber security. The show features interviews with top specialists in international security. The Berlin Security Beat is currently in its third season focusing on cyber security. The podcast is hosted and ...
  continue reading
 
Artwork

1
UN and Organized Crime Podcast

Global Initiative Against Transnational Organized Crime

Unsubscribe
Unsubscribe
Monthly
 
The UN and Organized Crime Podcast is a series from the Global Initiative against Transnational Organized Crime. As multilateralism itself comes under intense pressure, and as existing responses to transnational organized crime continue to fail, we’ll analyse the UN responses to the issue with some of the world’s leading experts as we try to unpack diplomatic discussions, policy developments and programme implementation.
  continue reading
 
Artwork

1
The Impact: Coronavirus and Organized Crime

Global Initiative Against Transnational Organized Crime

Unsubscribe
Unsubscribe
Monthly
 
The Impact: Coronavirus and Organized Crime is a special edition weekly podcast from the Global Initiative Against Transnational Organized Crime. We'll look at how the ongoing COVID-19 virus is impacting on organized crime around the world and how the illicit economy may affect our ability to respond to the virus. We'll be covering cyber crime, the illegal wildlife trade, counterfeit medicines, drug trafficking, human smuggling, corruption and human trafficking. This podcast uses the followi ...
  continue reading
 
Artwork

1
The Cyber Brief Podcast

National Cybersecurity Center

Unsubscribe
Unsubscribe
Monthly
 
The CyberBrief Podcast uncovers the latest cyber attacks, hacks, and stories that matter. Cyber crimes are growing exponentially, with many of the latest attacks & hacks being the biggest in history and costing billions of dollars. But what can we as cyber professionals, business leaders, or just people living in a digital age do? In this series, we’ll dive into the history of cybersecurity, some of the top hacks and scams in cyber, and what we can do about it. To mark Cybersecurity Awarenes ...
  continue reading
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
  continue reading
 
Artwork

1
Security So What!

Michael Ferguson

Unsubscribe
Unsubscribe
Monthly
 
Australian businesses were targeted with more advanced malware and cyber intrusions in 2014 than any other. We believe its time for Australian organisations to realize that we are firmly in the cross-hairs of global cyber criminals. This blog and podcast is so we can provide a platform to share stories of cyber crime from Australia and the rest of the world, and hopefully find ways Australian businesses can protect their organisation, customers and employees data from these threats.
  continue reading
 
Artwork

1
Modern Law - Droit Moderne

Canadian Bar Association

Unsubscribe
Unsubscribe
Monthly
 
Our laws and ethical practices have evolved over centuries. But today, tech is on an exponential curve and is affecting practically everyone—everywhere, pulling society from its roots and reordering the way we live. Amidst these changes, how do we make sure our laws keep pace with the times? Join Yves Faguy of CBA National in conversation with leading legal minds and practitioners exploring this question. -- Nos lois et nos pratiques en matière d'éthique ont évolué au fil des siècles. Mais a ...
  continue reading
 
In a world where we are so dependent on our phones, our computers and the internet, we explore what happens when you don't protect yourself online. Criminal Domain will expose the ways we leave ourselves open to potential hacking and phishing attacks, and how perpetrators use technology to manipulate us. World renowned futurist Mark Pesce and respected investigative journalist Claire Aird speak to victims of cyber crime to inform us how to better protect ourselves online.
  continue reading
 
Artwork

1
Decoding Security

Microsoft Australia

Unsubscribe
Unsubscribe
Monthly+
 
Decoding Security is a podcast from Microsoft Australia about how to protect your business from the ever changing threat of cyber crime. On the show, you’ll hear from leaders in cybersecurity, as well as Microsoft experts, as we break down strategies to help keep your business secure. From identifying threats, to managing incidents — we’ll crack the code to help you stay resilient, agile and competitive.
  continue reading
 
Artwork

1
How Hacks Happen

Many Worlds Productions

Unsubscribe
Unsubscribe
Monthly
 
Hacks, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
  continue reading
 
A riveting, original and comprehensive account of international crime and a brilliant critique of globalisation's dark side, McMafia contains full and often terrible stories behind today's most sensational headlines, charting a parallel universe of crime. Find out more at www.bodleyhead.co.uk.
  continue reading
 
Artwork

1
Naked City

The Age and Sydney Morning Herald

Unsubscribe
Unsubscribe
Monthly
 
Take a journey into the dark depths of the Australian criminal underworld with Australia’s most formidable crime reporter - John Silvester.
  continue reading
 
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
  continue reading
 
Artwork

1
Cyber Cafe

Lesline Gilzene

Unsubscribe
Unsubscribe
Daily+
 
Embark on a riveting journey into the heart of the cybersecurity career with host Lesline Gilzene, as she immerses you in the exploration of data breaches, incident response, and captivating real-world cybercrime narratives, uncovering the thriving stories of those on the front line of digital defense.
  continue reading
 
Artwork
 
Tech Legacies is a video podcast dedicated to sharing the career stories, lessons and advice of technology executives. The podcast serves an audience of tech-savvy listeners motivated to grow and succeed in their careers, while lifting their peers and the next generation of technologists.
  continue reading
 
Artwork

1
Compensating Controls

James Keeling on Podiobooks.com

Unsubscribe
Unsubscribe
Monthly
 
Nicholas Edgwood rides a wave of good karma–a job he excels at, a new girlfriend, and a bright future. When he gets framed for a cyber-crime he did not commit, he must run for his life while his entire world crumbles around him. Betrayal and murder replace peace and hope as he finds himself in unfamiliar territory. He may not be the biggest and baddest guy out there, but he has skills, the kind garnered from a career steeped in computers and code. Now he must leverage these skills to their f ...
  continue reading
 
Roughly once every 37 seconds, someone on earth falls victim to Cyber Crime. At least, that's what our most recent google search indicated. It's difficult to rationalize just how large the internet is, and can be even harder to truly understand just how important it is to stay safe in such a hostile environment. If nothing else, The Incident Handler's Guide to the Galaxy aims to equip its listeners with tools and real-world stories, offering a deeper dive into current events, tips, tricks an ...
  continue reading
 
Loading …
show series
 
In this episode of the Cyber Uncut podcast, Sabeen Malik, vice-president of global government affairs and public policy at Rapid7, joins Liam Garman to discuss the changing nature of global tech policy – applauding Australia’s stringent cyber security legislation. The pair begin the podcast by discussing Malik’s time developing tech policy within t…
  continue reading
 
Kurt Long CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage. We discuss new approaches to safe and private messaging apps, how to keep criminals out of your private data, and why online privacy is important to freedom. Chapters 01:09 Kurt Long's Work a…
  continue reading
 
There's a reason you should use a unique password for every website you use, but most people simply don't. How are you supposed to make and remember dozens of passwords for each site that are completely unique and can't be written down? What if I told you it doesn't have to be that difficult?By Chloe Thonus
  continue reading
 
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story about Apple users reporting that they are being targeted in elaborate phishing attacks that involve's a bug in Apple’s password reset feature. Joe and Dave share some listener follow up from Leo who shares some thoughts on episode…
  continue reading
 
Donovan Farrow is the CEO of Alias, which provides cybersecurity services, specializing in preventing, detecting, and responding to cyberattacks. He spent more than 20 years working for Schlumberger Oilfield Services, Loves Travel Stops, Chesapeake Energy and NTT Security in the fields of Information Technology, Information Security, Digital Forens…
  continue reading
 
Dr Chris Smith and the Naked Scientist team present the latest science news, analysis and breakthroughs. In this week's episode….Scientists invent artificial platelets to help us clot blood better, why it might be time to reappraise the peace loving nature of Bonobos, why the moon apparently turned itself inside out in the past. Plus as a special t…
  continue reading
 
Nausheen Chen joins us. She is a wildly popular professional public speaking coach with clients like leaders at Google, Amazon and huge brands like Timberland and more. Check out her site:www.speaking.coach Nausheen has a free course we encourage you to check out! https://www.speaking.coach/free-course/ She shares her insights on modern ways to imp…
  continue reading
 
Dr. Robert Blumofe, CTO at Akamai, sits down to talk about the AI doomsday versus a "very bad day" scenario. Dave shares a story from The Knowledge Project Podcast, where the host talks to Adam Robinson, a multifaceted individual known for his work as an author, educator, entrepreneur, and hedge fund advisor, and he talks about what is all incorpor…
  continue reading
 
Out-of-support DLink NAS devices contain hard coded backdoor credentials Privnote is not so "Priv" Crowdfense is willing to pay millions Engineers Pinpoint Cause of Voyager 1 Issue, Are Working on Solution SpinRite Update Minimum Viable Secure Product Show Notes - https://www.grc.com/sn/SN-969-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download …
  continue reading
 
Out-of-support DLink NAS devices contain hard coded backdoor credentials Privnote is not so "Priv" Crowdfense is willing to pay millions Engineers Pinpoint Cause of Voyager 1 Issue, Are Working on Solution SpinRite Update Minimum Viable Secure Product Show Notes - https://www.grc.com/sn/SN-969-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download …
  continue reading
 
AI and ML stand as pivotal technologies reshaping industries, yet how do they facilitate business operations and what pitfalls do they entail? Tune in as technologists Lee Grant and Nick Santilli delve into the transformative potential and inherent risks of AI in our latest discussion. chris.kousoulas@nutanix.com https://www.nutanix.com/company/cus…
  continue reading
 
In this week's episode of Hidden Files, a secret informant contacts a famous news reporter named Ashwin, offering exclusive news in exchange for 1 million rupees. Ashwin pays 100,000 rupees upfront but ends up being scammed by the informant. How will cyber security expert Amit Dubey crack this case? Tune in to Hidden Files to find out! See omnystud…
  continue reading
 
Chris Voss, founder of the Black Swan Group, joins us to share the story behind Never Split The Difference, the #1 Wall Street Journal best selling book on Negotiation. The most decorated FBI hostage negotiator in history, Chris Voss teaches his model Harvard Law, Georgetown University and others. Key Takeaways how never split the difference starte…
  continue reading
 
Chris Voss joins us to go INSIDE the famous negotiation model he created and share secrets behind Never Split the Difference, from the #1 Wall Street Journal best-selling book on Negotiation. Chris is the most decorated FBI hostage negotiator in history. He teaches his techniques at Harvard Law, Georgetown University, and others. He is the founder …
  continue reading
 
Dr Chris Smith and the Naked Scientist team present the latest science news, analysis and breakthroughs, In this week's episode we discuss why our belly fat could be key to helping people with spinal injuries, a breakthrough in understanding why the BRCA genes lead to breast cancer in some people and we look at the new breed of synthetic opioids ma…
  continue reading
 
Paul Eckloff was a US Secret Service Agent for 23 years. Today we discuss how deep fake videos increase security risks. Topics include: artificial intelligence risks in cyber, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, and how is ai making it harder to detect deep fa…
  continue reading
 
Learn how a programmer became a divisional CIO at FedEx. Gain insights on harnessing the power of education, mentoring and succession planning to grow your career and lift the next generation. Cheryl Bevelle-Orange is the Divisional CIO at FedEx and she shares her career journey along with the tips, advice and lessons learned along the way. Connect…
  continue reading
 
In this episode of the Cyber Uncut podcast, Ben Miller, chief information security officer at Dragos, joins host Liam Garman to unpack the increasing number of ransomware attacks directed towards industrial organizations and how OT/ICS operators can better protect their assets. The pair begin by unpacking how threat groups have adapted their TTPs t…
  continue reading
 
What is an NFT, and why would anyone want to buy one? There are lots of reasons why someone might buy a certified JPG or other NFT, but there's no guarantee your NFT will increase in value or even retain the value you paid for it. In this episode, host Michele Bousquet talks about different kinds of NFTs on the market, how they compare to physical …
  continue reading
 
In this episode of the Cyber Uncut podcast, Raj Samani, senior vice-president and chief scientist at Rapid7, joins host Liam Garman to provide intelligence direct from the cyber security battlefield. The pair begin the podcast by discussing the links between leading threat groups and rogue states, detailing their TTPs and operating models. Samani t…
  continue reading
 
A near-Universal (Local) Linux Elevation of Privilege vulnerability TechCrunch informed AT&T of a 5 year old data breach Signal to get very useful cloud backups Telegram to allow restricted incoming HP exits Russia ahead of schedule Advertisers are heavier users of Ad Blockers than average Americans! The Google Incognito Mode Lawsuit Canonical figh…
  continue reading
 
A near-Universal (Local) Linux Elevation of Privilege vulnerability TechCrunch informed AT&T of a 5 year old data breach Signal to get very useful cloud backups Telegram to allow restricted incoming HP exits Russia ahead of schedule Advertisers are heavier users of Ad Blockers than average Americans! The Google Incognito Mode Lawsuit Canonical figh…
  continue reading
 
We're looking at road design and management in this episode of Undercover Engineers! From pedestrian safety to wildlife conservation, and the integration of technology to enhance road efficiency and reduce environmental impact, we're looking at it all. Becky and Lloydie also chat about future road technologies, including data and AI, with a focus o…
  continue reading
 
No one is immune from being scammed. Just ask Tarah Wheeler, founder and CEO of Red Queen Dynamics, a company that specializes in keeping people scam-free. While onboarding a new hire, a process she put in place stopped a scammer despite a serious cyber misstep. “What the Hack with Adam Levin” is available wherever you get your podcasts. If you lik…
  continue reading
 
Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk abou…
  continue reading
 
Loading …

Quick Reference Guide