Best Pbx podcasts we could find (Updated March 2019)
Related podcasts: Tech Breaches Convergence Trojan Voip Auditing Selection Salaries Telecom Crypto Hackers Threats Resolution Dispute Voice Ip Maintenance Manager Negotiation Malware  
Pbx public [search 0]
×
Join millions of Player FM users today to get Pbx news and insights whenever you like, even when you're offline. Podcast smarter with the podcast app that refuses to compromise … it's free and easy.
Podcast smarter! Player FM is free and easy.
show episodes
 
D
Darknet Diaries
Monthly
 
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are.
 
T
Telecom Junkies
Monthly
 
Telecom Junkies is a bi-weekly podcast that is produced for the enterprise segment of our telecom market.
 
Loading …
show series
 
Nude selfies. This episode is all about nude selfies. What happens if you take one and give it to a vengeful boyfriend. What happens when a hacker knows you have them and wants to steal them from your phone. What happens is not good. This episode was sponsored by Nord VPN. Visit nordvpn.com/darknet and use promo code "DARKNET". This episode was ...…
 
In 2009 a hacker broke into a website with millions of users and downloaded the entire user database. What that hacker did with the data has changed the way we view account security even today. This episode was sponsored by CuriosityStream. A streaming service showing non-fiction and documtnaries. Visit https://curiositystream.com/darknet and u ...…
 
A carding kingpin was tracked by the Secret Service. How did he steal the cards? Where was he stealing them from? How much was he making doing this? And where did he go wrong? Find out all this and more as we listen to how the Secret Service investigated the case. This episode was sponsored by Eero. A solution to blanket your home in WiFi. Visi ...…
 
In late November 2018, a hacker found over 50,000 printers were exposed to the Internet in ways they shouldn't have been. He wanted to raise awareness of this problem, and got himself into a whole heap of trouble. For show notes and links visit DarknetDiaries.com. This episode was sponsored by CuriosityStream. A documentary streaming service. V ...…
 
In 2012, Saudi Aramco was hit with the most destructive virus ever. Thousands and thousands of computers were destroyed. Herculean efforts were made to restore them to operational status again. But who would do such an attack? Very special thanks goes to Chris Kubecka for sharing her story. She is author of the book Down the Rabbit Hole An OSIN ...…
 
Stuxnet was the most sophisticated virus ever discovered. It's target was a nuclear enrichment facility in Iran. This virus was successfully able to destroy numerous centrifuges. Hear who did it and why. Special thanks to Kim Zetter for joining us this episode. You can find more about Stuxnet from her book Count Down to Zero Day. Learn more abo ...…
 
Israel has their own version of the NSA called Unit 8200. I was curious what this unit does and tried to take a peek inside. Hear what I found by listening along to this episode. This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code “darknet”. This episode is also sponsored by Mack Weldon. Visit mackweldon ...…
 
Something is wrong with the Apple Podcasts top charts. As a podcaster, this personally annoyed and intrigued me. I investigate how this is happening and who is behind it. For show notes visit https://darknetdiaries.com/episode/27. This episode was sponsored by Nord VPN. Visit https://nordvpn.com/darknet and use promo code 'darknet'. This episod ...…
 
The IRS processes $3 trillion dollars a year. A lot of criminals want to get a piece of that. In 2015 the IRS had a large data breach. Hundreds of thousands of tax records were leaked. What happened and who was behind this? Listen to this episode to find out. For show notes visit https://darknetdiaries.com Learn more about your ad choices. Visi ...…
 
Alberto Hill was sent to prison for a long time for hacking. For a crime he said he did not commit. Listen to his story and you be the judge on whether he's guilty or not. Learn more about your ad choices. Visit megaphone.fm/adchoices
 
Darknet markets are online black markets. They are highly illegal, and dangerous to run. Hear exactly how dangerous it was for Alphabay and Hansa dark markets. Learn more about your ad choices. Visit megaphone.fm/adchoices
 
When banks started coming online, they almost immediately started being targeted by hackers. Vladimir Levin was one of the first ever known hacker to try to rob a bank. He succeeded a little, and failed a lot. Vladimir would go down in the history books as one of the most notorious hackers of all time because of his attempted online bank robber ...…
 
Three stories in one! In this episode we hear about a penetration test from Mubix that he'll never forget, a incident response from Robert M. Lee which completely stunned him, and a social engineering mission from Snow. Podcast recommendation: Moonshot. Learn more about your ad choices. Visit megaphone.fm/adchoices…
 
Ira Winkler's specialty is assembling elite teams of special forces and intelligence officers to go after companies. Ira shares a story about a time he and his team broke into a global 5 company. A company so large that theft of intellictual property could result in billions of dollars of damage. Ira's consulting company: Secure Mentum. His boo ...…
 
Chances are, if you were downloading shady programs in the early 2000's, you were infected with malware he wrote called SubSeven. Hacking changed mobman's life. Hear how it happened by listening to this episode. Image for this episode created by dr4w1ngluc4s. Check out his Instagram to see some amazing artwork! Check out the podcasts Van Sounds ...…
 
In 2009, around Christmas time, something terrible was lurking in the network at Google. Google is the most popular website on the Internet. It’s so popular many people just think Google is the Internet. Google hires many of the most talented minds and has been online since the 90s. Hacking into Google is no easy task. There’s a team of securit ...…
 
A man addicted to gambling finds a bug in a video poker machine that lets him win excessive amounts of money. Learn more about your ad choices. Visit megaphone.fm/adchoices
 
A 14-year-old kid who finds himself bored in class decides to hack someone's twitter account and ends up with more than he bargained for. Learn more about your ad choices. Visit megaphone.fm/adchoices
 
In 2007, a hacker named Eijah got fed up with the way DRM prevented him from being able to play the content he paid for. He decided to fight back against the AACS and find a way to circumvent the DRM. By the time Eijah was done, his life wasn't the same. Learn more about your ad choices. Visit megaphone.fm/adchoices…
 
A major retailer was hacked. Their point of sales machines were riddled with malware. Listen to hear how digital forensics and incident responders handled the situation. What malware was found? Where was it found? How was it stopped? And most importantly, how much data was leaked? Learn more about your ad choices. Visit megaphone.fm/adchoices…
 
In 2013 a hospital was accused of conducting a medical kidnapping against a young girl name Justina. This enraged many people across the country, including members of anonymous. A DDOS attack was waged against the hospital. Learn more about your ad choices. Visit megaphone.fm/adchoices
 
In 2012 the Carna Bot was built and unleashed on the world. But it didn't have any intentions on doing anything malicious. It was built just to help us all understand the Internet better. This botnet used the oldest security vulnerable in the book. And the data that came out of it was amazing. Learn more about your ad choices. Visit megaphone.f ...…
 
In the 1990's the Internet started to take shape. But the US goverment had strict laws regulating what type of cryptography is allowed to be used online. A few brave people stood up to the government in the name of civil rights and won the right to use strong encryption. Listen to their battle and what they had to do through to accomplish this. ...…
 
What happens when an innovative tech company, that's trying to develop the next big thing, detects a hacker in their network? We hear the story from a digital forensics investigator which has a surprising result. Learn more about your ad choices. Visit megaphone.fm/adchoices
 
In today's world of intelligence gathering, governments hack other governments. This episode takes you on a ride with a nation state actor to see exactly how it's done. Learn more about your ad choices. Visit megaphone.fm/adchoices
 
Mt. Gox was the largest bitcoin exchange in the world. It suddenly went offline. What happened? Learn more about your ad choices. Visit megaphone.fm/adchoices
 
Manfred found a way to turn his passion for video games and reverse engineering into a full time business. He exploited video games and sold virtual goods and currency for real money. This was his full time job. Listen to this episode to hear exactly how he did this. Learn more about your ad choices. Visit megaphone.fm/adchoices…
 
Manfred has had the most epic story of all online video game stories. For the last 20 years, he's been hacking online games. Learn more about your ad choices. Visit megaphone.fm/adchoices
 
Jayson E. Street tells us a story about the time he broke into a bank in Beirut Lebanon. Learn more about your ad choices. Visit megaphone.fm/adchoices
 
Security researcher Kyle Lovett bought a new Asus router in 2013. He found it was riddled with security vulnerabilties. He set out on a mission to resolve these vulnerabilities not only for his own router, but for thousands of others who were also vulnerable. Learn more about your ad choices. Visit megaphone.fm/adchoices…
 
Mobile provider TalkTalk suffered a major breach in 2015. The CEO tried her best to keep angry customers calm and carry on. The UK government and Metropolitan Police investigate the breach. We get a rare glimpse of how the CEO handles the crisis. Learn more about your ad choices. Visit megaphone.fm/adchoices…
 
The 2011 DigiNotar breach changed the way browsers do security. In this episode, we learn what role a CA plays, how browsers work with CAs, and what happens when a CA is breached. Learn more about your ad choices. Visit megaphone.fm/adchoices
 
VTech makes toy tablets, laptops, and watches for kids. In 2015, they were breached. The hacker downloaded gigs of children's data. Discover what the hacker did once he took the data. Learn more about your ad choices. Visit megaphone.fm/adchoices
 
Farhan Arshad and Noor Aziz Uddin were captured 2 years after being placed on the FBI's Cyber's Most Wanted list for PBX hacking. In this episode, we explain PBX hacking and how hackers are racking up billions of dollars in phone bills. We also learn how the two men were captured. Learn more about your ad choices. Visit megaphone.fm/adchoices…
 
Next Gen 911 (NG911) 2013 with the ability to deliver detailed location, medical, and environmental information about a 911 caller 2013 is a quantum leap over today's legacy E911. Just one problem, industry pros say it will be 3-5 years before significant deployments. But Mark Fletcher, Avaya's Public Safety Specialist and 911 guru reveals some ...…
 
Hyoun Park, principal analyst at Nucleus Research, and George David, president at CCMI, review telecom expense management (TEM) trends from 2012, and discuss what to expect in 2013. Find out why midsize organizations began to embrace TEM solutions more fully this year, plus understand how mobility, BYOD, and apps are forcing enterprises to cont ...…
 
Mobility, spectrum, and cloud computing were the dominant themes at the Telecommunications Industry Association's (TIA) annual conference in June. In this episode of Telecom Junkies, CCMI President George David talks with TIA President Grant Seiffert for an inside look at the conference to explain TIA's role in advancing these key trends and wh ...…
 
A headline session at May's International Avaya Users Group annual conference was "The Great E911 Debate," moderated by Avaya's Mark Fletcher and featuring four companies on the cutting edge of the E911 market. Our last Junkies episode gave you a look ahead on the debate, and now each of the participants return with an on-target review of the d ...…
 
A feature session at this year's International Avaya Users Group annual conference in Boston is "The Great E911 Debate." And this episode of Telecom Junkies gives you a taste of the issues and themes that will be covered by the panel. Listen in as moderator Mark J. Fletcher, ENP, Avaya's Product Manager for Public Safety, gives you a preview of ...…
 
Telecom manger Andrew Wolf at Linfield College had a problem -- one just about all communications pros face or will face: huge file downloads were chewing up precious bandwidth and dragging down network performance. Plenty of traditional fixes were available, but the cost and staff to manage the apps were serious obstacles. Then Andrew landed o ...…
 
Telecom procurement and management has grown more complex for SMBs as both wireline and wireless service offerings have exploded. Outsourcing may seem like an out-of-reach solution for many enterprises that think the costs will outweigh the benefits, but don't rush to judgment. In this episode, guest Telecom Junkies, Joanie Wexler, an independe ...…
 
QR – quick response – codes, those little square boxes, seem to be everywhere these days. But they have limitations, like the need to install yet another app (or several apps) on your mobile device in order the read the code. Listen in as Aram Kovach, CEO and chief fantasy officer at Mobius International, and George David, CCMI president and Vo ...…
 
Mobile data ... BYOD ... cloud computing ... internationalization ... TEM M&A activity ... just a few of the trends that impact enterprise-wide telecom expense management solutions. In this episode of Telecom Junkies, you hear about each, plus a lot more, when Joe Basili, managing director of the Telecom Expense Management Industry Association ...…
 
Believe it or not, but the technology behind the nation's 911 system is 40+ years old! But that's about to change – and quickly. CCMI President & Voice Report Publisher George David talks with 911 guru, Mark Fletcher, product manager of public safety solutions at Avaya, about next generation 911 (NG911), an affordable IP-based framework that de ...…
 
The hype about the growing move to BYOD – bring your own device – has many industry pundits predicting the demise of corporate-liable policies for mobile devices. "Not so fast," says Brandon Hampton, managing director at MOBI Wireless Management, in a fast-moving Telecom Junkies podcast discussion with CCMI President and Voice Report Publisher ...…
 
The average lifespan of a mobile device is now a mere 18 months (and getting shorter). That translates to 5 million "retired" devices every year in the U.S. Here's the issue: most of the devices sit in someone’s desk or in a forgotten storage room – or perhaps they're in a dumpster or landfill. And each device carries sensitive corporate data a ...…
 
Neglecting to change a default password is a much more common occurrence than you might think ... and there are several surprising reasons why. Security Evangelist & Microsolved CEO Brent Huston in a revealing conversation with George David, president of CCMI and publisher of Voice Report, walks through the behavioral and cultural factors that ...…
 
That's right, it's a brand new title. And whatever title you select, more and more enterprises now have a person charged with the specific responsibility to manage – cradle to grave – the deluge of mobile devices every enterprise faces today. Listen in as John Engles, Principal Product Manager – Mobility Group at Symantec and CCMI President and ...…
 
Expense management – for both mobile and wireline – is a well-established discipline among communications technology pros. And so are the ways expense management solutions are procured and deployed ... until now. Join Xigo CEO and co-founder Dave Spofford and CCMI President George David as they take a hard look at the market and technology driv ...…
 
The FCC has wrestled with inter-carrier compensation reform – the payment carriers make to each other – for years, and some insiders thought 2011 would be a breakthrough year that finally delivered real reform. The payoff for enterprises is lower rates for dedicated pipes and maybe even reductions in soaring USF fees. Join veteran FCC watcher A ...…
 
Google login Twitter login Classic login