Best Transactionfraud podcasts we could find (Updated January 2019)
Related podcasts: Tech Mobilesecurity Iotsecurity Breaches Informationsecurity Cybersecurity Risk Hacker  
Transactionfraud public [search 0]
×
Join millions of Player FM users today to get Transactionfraud news and insights whenever you like, even when you're offline. Podcast smarter with the podcast app that refuses to compromise … it's free and easy.
Podcast smarter! Player FM is free and easy.
show episodes
 
Listen to weekly round up of interesting cyber security stories from across the globe. Each podcast delves deeper into a particular story revealing insights and the often unheard story to listeners. The show is hosted by Mansi Kapur, business journalist with Fortune and Jose Varghese, cyber security entrepreneur and geek with Paladion.
 
Loading …
show series
 
If data is the new oil, Google has some of the biggest refineries in the world. Raw data in, insights and analysis out, but what about privacy and confidentiality? Google information also powers advertising designed to target you as an individual. How? By using your personal data, preferences, and often many more of your intimate details. Trust ...…
 
Personally Identifiable Information or PII can be dangerous in the wrong hands. Phishing, identity theft, and cyber extortion are just some of the threats. But how much do you think about data security when using chauffeuring services like Uber? Join us in this podcast to find out about the policies for data retention and the security issues th ...…
 
Have you received threatening email recently? You’re not alone. We talk about how it happens and what you can do to stop it affecting you. First, find out about even supposedly reputable Internet actors that make it difficult for you to protect your privacy. Get the lowdown on the way that password and email files are hacked and resold for phis ...…
 
Are mobile banking apps safe? We discuss app risks and threats that could seriously affect your banking well-being if you don’t watch out for them. We also run through the differences between mobile and desktop banking, and why the banking sector may be making a rod for its own back by trying to be too helpful to customers using mobiles. Find o ...…
 
There may be far more of you, personally, on the web than you think. In this podcast, we discuss how social media giants and other popular internet firms collect huge amounts of data… on you! Ostensibly, they do this to better know you and meet your needs. However, the danger is in the abuse of that data. The Facebook - Cambridge Analytica case ...…
 
Roll up, roll up, online buyers and sellers! We dive into the world of Amazon to see if users are adequately protected in their transactions. While the online retailing leader has several built-in safeguards, there are still ways that users can game the system. Is your credit card safe? Can you trust product reviews? What should you look for in ...…
 
Election rigging hit the news recently, with horror stories of the Cambridge Analytica company exploiting data on 50 million people, all from a quiz-master using Facebook. We tell you how that quiz data was used to produce psychographic profiles whose tentacles stretched back into Facebook’s huge database of links and Likes. How it was made rea ...…
 
A bitcoin and blockchain information bonanza awaits you in this podcast. To find out what’s really going on and what you can, should or cannot do, we’ve invited our special guest Narayan Neelakantan, the co-founder and CEO of Block Armour. Listen to Narayan tell it like it is, including why banks are now so interested in blockchain and what’s a ...…
 
How much does your grocer know about you, or your travel agent, or your taxi driver? If you’re buying and booking online, it could be a lot more than you think. In this month’s podcast, we look at the impact of ecommerce on our data privacy. Buying preferences, personal profile, it can all be analyzed to second-guess what you want to purchase n ...…
 
This month’s podcast covers drones that won’t leave you alone, real-world holdups to rob people of virtual currency, the fight against fake news, and updates on that hot digital potato, Aadhaar. Despite government guidelines and best practices, Aadhaar still has significant fear, uncertainty and doubt to contend with. Recent events like governm ...…
 
Which is scarier, malware that figures out your behaviour and adapts to it, or your Aadhaar number out on the web for all to see? In this podcast, we discuss both possibilities and recent events connected with them. We also run through a few of the things designed to protect your Aadhaar personal information. They include random number generati ...…
 
As we move into 2018, we look at how the privacy and security wars are likely to be fought. Will users ever be safe from criminal hacking AND government snooping? At least one mega-messaging platform is trying right both those wrongs, while a social media leader just upped the stakes against social engineering. We also look back on winners and ...…
 
This week, we go beneath the hood of WhatsApp and investigate the popular chat app’s approach to privacy and conversation security. Our experts explain which data WhatsApp does not copy, which it keeps, and what steps you can take to keep your WhatsApp conversations as secure as possible. Finally, we discuss WhatsApps future monetization strate ...…
 
Learn how you can stay safe when using free file transfer services such as WeTransfer, Dropbox, SendThisFile, etc. In this latest podcast, our experts discuss: how attackers are exploiting free file transfer services to infect your systems, inherent vulnerabilities in the transfer process, the privacy these services provide, and steps you can t ...…
 
This week, we dig into another data-collecting giant: Facebook. We talk about the different kinds of data Facebook collects from its users, the ways Facebook uses this data, and new developments in Facebook’s ability to recognize your face and read your emotions—and how Facebook is exploiting these new capabilities to better support their adver ...…
 
This week, we talk all about Google. Specifically—just how much of your data Google stores, and what you can do about it. We bring on two experts to explain more than just stored search histories. Our experts discuss the data Google collects from Chrome, YouTube, and Android, and what Google is really doing with all this data. We close out expl ...…
 
In this week’s episode, we look at security on Android and iOS operating systems. Our experts discuss security features these providers have put together, vulnerabilities you should be aware of, protecting data on your mobile phones, security on app stores, app permissions you should be wary of, and more. In news, we talk about a new attack tre ...…
 
Last week, we discussed some successful social engineering techniques cyber criminals still use. This week, we dive dipper into social engineering and get expert tips from experts on how to combat social engineering. How to spot emails that seem to be from your friend or boss? How to identify a genuine phone call from your banker? And more. In ...…
 
This week we discuss the widely popular technique cyber criminals use to gain access to your account credentials; social engineering. This could be to gain access to your email account, your bank account and pin, and even your personal information such as DOB and Mother’s Maiden name. Our hosts share accounts of clever social engineering tactic ...…
 
In this week’s episode, we explore Payment apps such as Samsung Pay, Apple Pay, Android Pay, Payzapp, Citi Pay, etc. We answer questions like; how does it work, how to access and use these apps, security innovation these apps have brought, POS machines that support these payments, what happens if you lose your phone loaded with these payment ap ...…
 
In this week’s episode we talk about the future of contactless cards. The popularity of contactless cards is gaining rapidly. The current year so far has seen more contactless transactions then anytime earlier. While consumer’s find contactless card payments a very convenient mode to make a purchase, very few are actually aware of the risks ass ...…
 
In this week’s episode we ask the question, how secure is your mobile phone? Many people now do everything on their smart phones, but you may be putting yourself at risk every time you open an app or use WiFi. We will discuss what it is about your phone that makes it a target for hackers, what some companies are doing to protect you, and most i ...…
 
In this episode we look at the one of the most used and possibly most misunderstood aspects of modern business – cloud computing. We’ll trace the origins of shared networks and discuss whether or not turning all of your most precious data over to a third party makes you safer or more vulnerable to attacks. We will also let you know the various ...…
 
In the 8th episode, we look at security around an electronic voting machine (EVM), vulnerabilities in the system, the extent of impact hacking an EVM machine can have, and the future of electronic voting. We also cover the recent Wanna Cry Ransomware threat and discuss what went wrong and how it was able spread so quickly.…
 
In this week’s episode we look at the growing threat of malware. In 2016, a new malware was developed every 4.6 seconds and the cyber security world has been forced to keep up. We will discuss what malware is, how it has changed and developed and what the experts are doing to keep us safe. We will also give our listeners tips on how they can st ...…
 
In this episode we discuss how hackers have made using your payment card in person just as risky as paying online. We will look at the methods hackers use to steal your information, including how they are able to get your card data and how they can steal your PIN. We’ll also discuss some of the more sophisticated attacks on payment cards and pr ...…
 
In this episode we examine why Bitcoin is the chosen currency of cyber criminals. We discuss the journey Bitcoin took to become the ultimate financial tool of the criminal world as well as the technology behind it. We will also reveal the truth behind Bitcoin’s supposed anonymity. Is Bitcoin the future or is law enforcement closing in on this o ...…
 
In February 2016, Hollywood Presbyterian Medical Center in Los Angeles, CA was hit by a ransomware attack that ultimately cost them $17,000 when cyber attackers were effectively able to shut down the hospital unless they paid up. In this episode, we discuss the increased targeting of both small and large organizations and enterprises, how ranso ...…
 
Today, we’re going to talk about something that affects all of us, thanks to the government’s insistence on Aadhaar. We are talking of biometric authentication, or the use of fingerprints, iris scans, voice recognition and so on, to secure your data. We will be looking at how this works and if there are security risks involved in biometrics. Fi ...…
 
Using a debit or credit card or any kind of plastic money comes with its set of risks. In fact, stealing credit card data was the first big trend in the history of cyber-attacks. We’ve come a long way since then and built solid defense systems. But with e-commerce taking off in a big way in the past few years, usage of credit and debit cards to ...…
 
How secure are digital wallets? Online security is something that doesn’t just worry Snowden, it affects all of us, especially, when it concerns our money. In fact, after demonetisation in India, cash hasn’t been easily available, forcing everyone to use cashless options like digital wallets. Suddenly, digital wallets like Paytm, Mobiwik, Freec ...…
 
Google login Twitter login Classic login