Privacy Security OSINT public
[search 0]
More
Download the App!
show episodes
 
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the trends that truly matter. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, end-to ...
  continue reading
 
Artwork
 
We make the topic of privacy approachable. For both businesses and consumers. With so much of our lives taking place online today, it's easy to overlook the dangers associated with sharing your personal data with companies and strangers. Many people are aware that privacy is a problem but they don't know where to begin. Privacy Files explains the vast array of privacy issues facing society in easy-to-understand language. Then we give you practical solutions to quickly and effortlessly make t ...
  continue reading
 
Official Website: https://lockdown.media Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional. Follow the show on Twitter @privacypod
  continue reading
 
Here at Cyber Sector 7 our main goal is to Inform you and give you Security Tips, Digital Privacy Tips, OSINT Methods, and to teach you about hacker methods, culture, and news. We want to inform you of how important security and privacy is. This is for everyone, even if you know nothing about computers, we want you to stay informed.
  continue reading
 
A skilled individual can effortlessly blend into any environment without drawing attention, effectively hiding their true capabilities and intentions. They seamlessly mingle, remain unmemorable, and forge relationships to gather vital information for their objectives. Every move they make is calculated and intended to keep them inconspicuous. Originating from espionage, the term "gray man" refers to incorporating spy tradecraft into one's daily life. This involves honing skills essential for ...
  continue reading
 
Loading …
show series
 
On this show, we have talked quite a bit about the red hot cybersecurity industry. Companies can't fill open positions fast enough. Globally, cybersecurity spending exceeds $200 billion. But there's a small problem. You might call it a cybersecurity paradox. Despite companies spending more than ever on cybersecurity, companies are also losing data …
  continue reading
 
The rapid rise of artificial intelligence (AI) is bringing great promise to the world in the form of increased productivity and a better quality of life. However, as with any new technology, there are people who look to leverage it for nefarious purposes. Deepfakes are seemingly everywhere now. And while some are being used for humor or general ent…
  continue reading
 
Security Noise starts a multi episode look at how to start or grow a career in infoSec. We begin by talking with Senior Security Consultant Kelsey Segrue and Security Consultant Olivia Cate who took what might be considered the traditional route. They share their stories and offer some insights into how to maximize the advantage of similar opportun…
  continue reading
 
Web3, or Web 3.0, is a new vision for the World Wide Web where the user is in control. While Web3 has been called many things, there's no doubt that its architecture enables for the democratization of the web. The key concepts of Web3 include decentralization, blockchain technologies and token-based economies. While the pervasiveness of fraud in cr…
  continue reading
 
With large data breaches making headline news nearly every week, cybersecurity is a hot topic. Recently, AT&T discovered the personal information of more than 70 million current and former customers being sold on the Dark Web. Compounding this is the fact that it takes on average nearly seven months for a corporate security and compliance team to e…
  continue reading
 
On this episode of Security Noise, we are revisiting the topic of open-source intelligence (OSINT) in the wake of the theories spurred by the Royal Family's social media photo that was quickly flagged as being altered. Along with guests, Senior Security Consultants Joe Sullivan and David Boyd, we delve into various theories surrounding the Princess…
  continue reading
 
According to a recent study at the University of Texas at Austin, from January 2020 to February 2024, people lost more than $75 billion around the world to the scam of pig butchering. Named after the practice of farmers fattening hogs before slaughter, victims are lured into fake crypto investments. Once victims send enough funds, the scammers disa…
  continue reading
 
In 2023, Americans lost more than $10 billion to fraud. This is the largest annual loss in US history. In terms of dollars lost, investment scams emptied consumers' bank accounts more than any other scam at $4.6 billion. But a close second was imposter scams at $2.7 billion. In this episode of Privacy Files, we look at the tragic story of former Ne…
  continue reading
 
The demand for cybersecurity professionals is strong. Job vacancies in the industry grew from one million in 2013 to 3.5 million in 2021. And because of this shortfall in talent, companies are struggling to keep up with the latest in modern threat awareness, including phishing, social engineering, Business Email Compromise (BEC), and financial frau…
  continue reading
 
In this week's show, I discuss CLEAR's intrusive privacy policy and highlight alternatives to Authy using KeePass, with a privacy friendly solution for scanning QR codes. I also address the common mistakes people make when backing up their MFA codes. Additionally, I share some of the highlights from attending the SANS OSINT Summit in Washington, D.…
  continue reading
 
In 2015, Dr. Robert Epstein, a psychologist at the American Institute for Behavioral Research and Technology, made world news. Dr. Epstein was one of the authors of a groundbreaking study that found that Google's search ranking algorithm could influence how people vote. Even more shocking, according to Dr. Epstein, "We estimate, based on win margin…
  continue reading
 
We look into the release of the Open Source Intelligence (OSINT) strategy, a pivotal development now under the stewardship of the CIA. This strategy outlines a comprehensive approach, encompassing enhanced training, rigorous standardization, innovative collection methods, refined tradecraft, and robust intelligence sharing mechanisms, all aimed at …
  continue reading
 
The critical process of vetting volunteer sources, is a skill paramount for journalists, researchers, and anyone relying on external information. #Grayman #podcast We explore the powerful technique of using repeat and control questions, a method designed to establish the reliability of a source and the accuracy of their information. Learn how askin…
  continue reading
 
In 2023, it is estimated that $3.1 trillion in illicit funds moved through the global financial system. Financial crimes can take many forms. Money laundering accounted for trillions of dollars supporting a wide range of crimes, including $346.7 billion in human trafficking, $782.9 billion in drug trafficking activity, and $11.5 billion in terroris…
  continue reading
 
In today's show, I have a conversation with Lawrence Gentellio, the CEO and Founder of Optery, a personal data removal service. Lawrence shares his own experiences with identity theft and what motivated him to start Optery. We also discuss the future of privacy in the United States, Utah's new privacy law, the Utah Consumer Privacy Act (UCPA), and …
  continue reading
 
It's Leak Week for this episode of Security Noise! Geoff and Skyler chat with Security Consultant Whitney Phillips and Senior Security Consultant Kurt Muhl about a number of recent privacy pitfalls including destructive ransomware groups such as LockBit, leaked government emails, and other data and privacy mishaps. References: https://krebsonsecuri…
  continue reading
 
Whether you're a seasoned traveler or planning your first European adventure, this episode arms you with essential knowledge and best practices to ensure a secure and enjoyable trip. #podcast #grayman We'll discuss what you need to know about choosing and staying in hotels, from checking in to safeguarding your belongings. Understand the intricacie…
  continue reading
 
According to the Federal Trade Commission (FTC) in the United States, consumers reported losing more than $10 billion to fraud in 2023. This is a 14% increase over reported losses in 2022. Some of the most common scams include investment scams, imposter scams, bank transfer scams and cryptocurrency scams. "Digital tools are making it easier than ev…
  continue reading
 
The rise of remote work has led to the rise of a wild phenomenon: the overemployed. While it is difficult to know exactly how many people juggle multiple full-time jobs simultaneously, it is evident the trend is more common than most realize. 79% of remote workers say they have been overemployed within the past year In fact, on Reddit, there is a s…
  continue reading
 
The Mindful Business Security Show is a call-in radio style podcast for small business leaders. In this episode, Accidental CISO is accompanied by guest host Brent Hinks. Brent is a longtime industry veteran. He's worked in a wide range of roles and industry verticals. For the last six years, he's been focused helping organization's implement AI se…
  continue reading
 
We explore the impact of wisdom and motivational statements on personal and professional development.#Grayman #podcast Drawing upon lessons learned from the discipline, leadership, courage, and teamwork inherent in military service, this episode offers listeners a series of powerful, motivational insights designed to inspire resilience, determinati…
  continue reading
 
In this weeks show I discuss some of the concerns of using TOR over a VPN, and take another look at data removal from people search sites, including a look at Mozilla Monitor, a new service for data removal from the makers of Firefox. I'll also discuss the importance of freezing your credit and putting the title of your home into a revocable living…
  continue reading
 
We explore the world of situational awareness through the lens of fun and educational games and exercises suitable for both kids and adults. #Grayman #podcast Discover how turning awareness training into interactive play enhances your ability to notice details about your surroundings and improve reaction times, decision-making skills, and overall s…
  continue reading
 
Did the #NSA buy personal data illegally obtained from smartphone users? #Grayman #podcast Discover The Latest In Grayman Gear🔥🛍️ http://tinyurl.com/Grayman-Store Contact Us 🎙️ Send a voice message⁠ to be featured on the show! Email iamshammer@protonmail.com Facebook https://www.facebook.com/graymanconcepts Twitter/X https://twitter.com/GraymanConc…
  continue reading
 
We take a moment to pause and reflect on the instances where I may have led our listeners astray, whether through willful omission, unintentional misinformation, or the subtle art of misleading. #Grayman #podcast #lying This episode isn't just about admitting faults but understanding the why behind each moment. Was it to protect privacy, simplify c…
  continue reading
 
Modern organizations face continuous threats from bad actors that put systems, data and people at great risk. This is why it's critical for companies to adopt solid cyber governance strategies. Cyber governance, or cybersecurity governance, is a holistic approach to mitigating business risks. Via risk management and security awareness, companies de…
  continue reading
 
The essential steps and strategies to safeguard your mobile device from the vulnerabilities exposed by public #WiFi and data networks. #Grayman #podcast #security Discover how to adjust your phone's settings for maximum privacy and why minimizing the use of public networks can be a crucial step toward digital security. We'll also explore the concep…
  continue reading
 
If you have ever spent some time on dating apps, you most likely have encountered fake profiles. And with recent improvements in AI, there's a good chance some of those fake profiles aren't even using pictures of real people. According to the Federal Trade Commission (FTC), in 2022, nearly 70,000 people reported some form of a romance scam, with to…
  continue reading
 
Geoff and Skyler talk to Incident Response Practice Lead Tyler Hudak about when you need an IR plan, what kind of relationships you should have with your IR vendor, and what things to know before perusing an IR retainer. The conversation looks at the needs for businesses of various sizes, proposes some self-assessment questions, and concludes with …
  continue reading
 
In this Friday Field Notes episode of The Lockdown, I share my experience with imposter syndrome, and compare practical privacy approaches with extreme measures, inspired by my move to the USA. Follow on Twitter (X): @privacypod Support the show: https://www.patreon.com/TheLockdown This episode was recorded on January 31, 2024 In this week's episod…
  continue reading
 
This week, I introduce Defensive OSINT, address privacy concerns while on the road, and examine the intricacies of alias usage and AI-based face morphing for photo alteration. Sharing insights from my recent travels, I highlight the need for vigilance and innovative strategies for maintaining privacy on the go. The episode explores the pros and con…
  continue reading
 
Crucial aspects of security and #safety in apartment buildings. We discuss what residents should be vigilant about, including potential #security lapses in common areas, and assessing the security measures of a building before moving in The episode provides tips on dealing with neighbors, understanding security personnel and building employees, man…
  continue reading
 
Whether it's at work or at home, everything we do online is based on permissions. If you have the proper credentials, you can obtain access. When permissions management breaks down or a threat actor manages to gain unauthorized access, the situation can deteriorate very quickly. In this episode of Privacy Files, we talk to Jake Moshenko. Jake is an…
  continue reading
 
We challenge and dissect the question, “Was Jeffery #Epstein working for the #CIA?” The enigmatic stories of famous individuals and celebrities who were entangled in the clandestine world of espionage will always captivate the public. While Epstein met their demise in prison under mysterious and controversial circumstances, leaving behind a trail o…
  continue reading
 
The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! In this episode, Accidental CISO is flying solo and providing some updates about changes coming to the show. We'll be releasing some security awareness training content soon and updati…
  continue reading
 
We challenge and dissect several widely held beliefs about lying and deception that are scientifically inaccurate. This show aims to enlighten listeners on the realities of detecting deceit, moving beyond popular misconceptions. Do liars avoid eye contact? Can a nervous twitch reveal dishonesty? Is there a foolproof way to spot a liar? We confront …
  continue reading
 
In this episode of Privacy Files, we talk to Cindy Cohn, an American civil liberties attorney and the Executive Director of the Electronic Frontier Foundation (EFF). In 2018, Forbes named Cindy one of America's Top 50 Women in Tech. Cindy's passion for internet law spans decades and has put her in the middle of landmark legal cases involving privac…
  continue reading
 
In this unique episode we explore the concept of the get-home bag, tailored specifically for single individuals with canine companions.Our journey begins with an in-depth look at the 'get-home bag' – an essential kit designed to help you and your furry friend safely navigate unexpected emergencies or situations where you're away from home and need …
  continue reading
 
Geoff and Skyler make bold predictions for 2024 about AI, changes to Air Tags, and Open Source! LINKS: https://techcrunch.com/2024/01/04/orrick-law-firm-data-breach/ https://arstechnica.com/security/2023/12/researchers-come-up-with-better-idea-to-prevent-airtag-stalking/ https://www.theregister.com/2023/12/27/bruce_perens_post_open/…
  continue reading
 
Happy New Year! In this first Privacy Files episode of 2024, we kick off a new true crime series...with a privacy angle. We examine the disturbing crime of cyber kidnapping. According to the FBI, scammers have been perpetrating variations of cyber kidnapping for at least 20 years. Sometimes called "virtual kidnapping," cyber kidnapping is an extort…
  continue reading
 
In this week's episode, it's time to wrap up 2023 with another look at Privacy.com, and my strategies for avoiding bank account lockout. I delve into the CIA Triad, breaking down its relevance to everyday privacy concerns. The episode also takes a practical turn with a guide on using FindMyDevice on GrapheneOS, and the FindMyDevice feature on the G…
  continue reading
 
In this episode of The Grayman Concept, we delve into the critical process of structuring an area study, an essential skill for anyone looking to blend seamlessly into any environment and to deepen their understanding of world affairs.We kick off by discussing the methodology I personally used to initiate my research, providing listeners with a pra…
  continue reading
 
How close are #surveillance and #AI platforms to predicting the behaviors and actions of criminals, terrorists, and the rest of us? In this #Grayman #podcast we discuss the current and future capability of government-controlled technology.In This Episodehttps://www.imdb.com/title/tt1839578/plotsummary/Discover The Latest In Grayman Gear🔥🛍️http://ti…
  continue reading
 
What do the wars in #Israel and #Ukraine have to do with #recession here in America? What financial move is keeping the U.S. out of recession? We discuss season 5, The #Grayman Project and upcoming improvements to the #podcast Discover The Latest In Grayman Gear🔥🛍️ http://tinyurl.com/Grayman-Store Contact Us 🎙️ Send a voice message⁠ to be featured …
  continue reading
 
Quick Note: This is the last episode of 2023. We will be back the second week of January 2024 with exciting new changes and many more fascinating guests. Thank you to everyone who has supported Privacy Files over the past year. You have given us encouragement to continue our mission to help the world take back control over its personal information.…
  continue reading
 
The concept of #IoT dates back to the 1980s and 1990s, with the first internet-connected toaster created in 1990. We discuss the #cybersecurity threat, infrastructure, protection measures, and the future of IOT integration with #5G and #AI #Grayman #podcast Discover The Latest In Grayman Gear🔥🛍️ http://tinyurl.com/Grayman-Store Contact Us 🎙️ Send a…
  continue reading
 
We discuss rapport building that may be malicious. An introduction to Micro Expressions and Macro Expressions. The Recent arrest of a #USAF Airmen for violating the #Espionageact #Grayman #podcast https://www.militarytimes.com/news/your-military/2023/12/11/15-air-national-guardsmen-disciplined-in-discord-server-leak/Discover The Latest In Grayman G…
  continue reading
 
Loading …

Quick Reference Guide