Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
1
Info Stealers Exposed. Protecting Identities Online.
1:01:34
1:01:34
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:01:34
Interview with Malware Protection expert Leonid Rozenberg with Hudson Rock (hudsonrock.com) on exposing information stealers, protecting identities online and what to do if your identity has been hacked. Check out Hudson Rock’s free tools are available here - https://www.hudsonrock.com/threat-intelligence-cybercrime-tools Send us a text Get peace o…
…
continue reading
1
Unmasking Cyber Threats with a Master Storyteller
58:40
58:40
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
58:40
Dan Elliott, Principal Cyber Security Risk Advisor at Zurich, and notoriously talented storyteller for complex subjects, joins us. Topics: how story telling helps leaders, Benefits Of Story Telling In Business, cyber security story telling, benefits of story telling for complex topics, analogies used in cyber security, benefits for having security …
…
continue reading
1
Weird Dangerous Findings on The Dark Web
46:58
46:58
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
46:58
The dangers that lurk on the Dark Web. Many people who have visited have said they have seen things they never wanted to see. We take you there. We explain why it’s so important for everyone to know what’s there since we provide a roadmap to you, your family and the brands we all serve These are the true crime stories about what happens when we shi…
…
continue reading
1
Cyber Risk Unleashed. Latest Threats To Business.
55:28
55:28
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
55:28
Elizabeth Houser, Director of Cyber defense at Defense Storm, discusses her role in cybersecurity and her creation of the Security Intel Bulletin. We discuss what cyber risk means for business leaders today. She emphasizes the importance of translating cybersecurity topics into plain language to increase awareness and understanding among business l…
…
continue reading
1
OPEN AI News Today. Changes Announced.
5:00
5:00
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
5:00
Cyber Flash Point on OPEN AI News Today. Changes Announced. In Open AI News Today, Mira Murati former CTO of OPEN AI announces she is leaving. Find out why. Send us a text Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Imagine setting yourself apart from the competition…
…
continue reading
1
The Shocking Rise and Fall of 23andMe. Exposed.
27:54
27:54
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
27:54
We expose and discuss the rise and fall of genetic testing company 23andMe. On September 13th, 2024 the once popular genetic testing company “23andMe” agreed to a $30 million settlement stemming from a data breach that affected nearly 7 million users. The next day, on September 14th every single board member resigned. Victims of the data breach are…
…
continue reading
1
Cyber Careers Demystified. What Employers Want.
1:19:54
1:19:54
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:19:54
Cybersecurity expert, teacher and coach, TJ Houston, joins us to discuss what employers want for cybersecurity careers, and share real ways how to start a career in cybersecurity with no experience, how to get entry level cybersecurity job and other insights. We cover career options in cybersecurity, how to start a career in cybersecurity with no e…
…
continue reading
1
Biggest Cyber Insurance Mistakes To Avoid
1:01:05
1:01:05
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:01:05
Joined by Joseph Brunsman discussing how to avoid cyber insurance mistakes, biggest cyber insurance mistakes to avoid, and how to transfer risk for SMBs. Send us a text Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Imagine setting yourself apart from the competition be…
…
continue reading
1
AI Showdown: Deepfake Dangers. Who's Winning the Race?
28:45
28:45
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:45
We review the latest New Dangers of Synthetic Media. Asking Who Will Win the AI Race? We identify the risks and current available solutions. CHAPTERS 00:00 Introduction 00:32 The Rise of Deepfakes and Their Threats 03:56 Deepfakes in Cybercrime and Social Engineering 06:46 latest cyber risks from deep fake 09:49 Strategies for Deepfake Detection an…
…
continue reading
1
Death in Crypto Land. Ultimate Exit Scam.
48:46
48:46
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
48:46
This is the story of a notorious death in cryptoland. Many say it’s the ultimate exist scam. Gerald Cotten, the founder of QuadrigaCX, died in 2018 under mysterious circumstances, leading to the loss of $215 million in cryptocurrency. Despite claims that he passed away due to what is medically considered non-fatal Crohn’s disease while in India, ma…
…
continue reading
1
How to Measure Cyber Risk Today: Guidelines for Leaders
1:05:23
1:05:23
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:05:23
What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to Know Ryan Leirvik who joins us in the studio. Ryan is the CEO of Neuvik & author of Under…
…
continue reading
1
Protecting Identities - Best Practices and Fraud Prevention
56:23
56:23
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
56:23
Fraud Expert Ayelet Biger joins us. Find her at her site: https://scamranger.ai/ Chapters 00:00 Introduction and Overview 02:49 Shining a Light on the Victim's Perspective 10:00 Creating a Seamless User Experience 12:23 The Role of Behavioral Biometrics in Fraud Detection 15:16 Distinguishing Between Legitimate Users and Cyber Criminals 20:06 The E…
…
continue reading
1
The Power Behind the Headlines-Media Relations Effect on Cyber Security
35:06
35:06
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
35:06
Learn valuable strategies for managing Media Relations Effect on Cyber Security And mitigating the impact of data breaches. We dive deep into surprising reality of why media relations are important for data breach planning, how media relations effect cyber security, and how social media effects cyber security. Exploring the crucial intersection of …
…
continue reading
1
Historical Context of Generative AI. AI And Humanity.
48:05
48:05
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
48:05
David Mauro interviews Mike Acerra, the president and founder of Luxblox, about AI and its role in humanity. They discuss the evolution of technology, from typewriters to computers, and the impact of AI on various industries. Mike shares the story of how Luxblox was created and how it encourages creativity and problem-solving. They also touch on th…
…
continue reading
1
How Parents Can Protect Children Online.
58:33
58:33
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
58:33
Titania Jordan. Best-selling author, CMO of Bark, and regular TV Guest on national TV shows, Titania Jordan, joins us to discuss Parenting in a Tech World. We discuss: Common misconceptions and Parental Challenges today The Role and Responsibilities Social Media companies have and should have Best Practices and Practical Suggestion to manage the te…
…
continue reading
1
Hacking Big Tech. Bryan Seely Interview.
1:06:40
1:06:40
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:06:40
Bryan Seely joins us is a refreshing and hilariously entertaining episode. Bryan is a world-famous cyber security expert, ethical hacker and former U.S. Marine. He is known for his book (Web of Lies) and for intercepting calls to the U.S. Secret Service & FBI, as well as finding major exploits at LinkedIn and several government 3-Letter agencies. C…
…
continue reading
1
Biggest Data Breach in Modern History. What To Do Now.
51:23
51:23
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
51:23
The world of cybersecurity has been rocked by a data breach so colossal that it's being called the Biggest Data Breach in Modern History. The National Public Data breach and hacker USDoD are discussed in a true cyber crime story. The biggest data breach in modern history, involving National Public Data and its sister site Records Check. The breach …
…
continue reading
1
What Happened to UBER. How Uber Broke Trust.
1:13:34
1:13:34
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:13:34
This episode explores the rise and controversies of Uber, including its inception, expansion, rebranding, leadership changes, autonomous vehicle program, protests, toxic culture, and legal troubles. It also delves into the significance of a major data breach, the trial of Joe Sullivan, Uber's former chief security officer, and recent fines assessed…
…
continue reading
1
The Aftermath. Navigating Reputations and Protecting Your Brand Image
52:42
52:42
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
52:42
James Potter, CEO of DSE, joins us in the studio for great conversation and exclusive insight on The Aftermath of Data Breaches: Navigating Reputational Damage and Protecting Your Brand Image. Reputational Harm from Data Breaches, Cybersecurity Reputation Management and Operational Leadership. Find more on DSE here: https://www.dse.team/ Topics dis…
…
continue reading
1
When Ransomware Turns Deadly: Breaking Cyber Crime News and Essential Security Tips for Businesses
29:21
29:21
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:21
Cyber Flash Point on the following topics: how ransomware kills in real life, latest cyber crime news, top cyber crime news, when ransomware kills in real life, best ways to keep up to date on security news, best ways to protect business from cyber crime, breaking cyber crime news, breaking cyber crime news to know, cyber crime global news today, c…
…
continue reading
1
Deceptive Realities: Unmasking the Threat of Deep Fakes in Cybersecurity
1:14:57
1:14:57
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:14:57
Today we discuss how deep fake videos increase security risks. Topics include: artificial intelligence risks in cyber, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, and how is ai making it harder to detect deep fakes. Takeaways Sample deepfakes are played. Can you tell?…
…
continue reading
1
Harnessing Emerging Tech: Imagination and AI in Brand Growth, and the Perils of 'Too Big to Fail"
59:47
59:47
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
59:47
When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss: Harnessing Emerging Tech: Imagination and AI in …
…
continue reading
1
Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure
1:39:04
1:39:04
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
1:39:04
Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:0…
…
continue reading
1
How Ransomware Can Kill. Ways To Build Security Resilience.
58:44
58:44
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
58:44
We discuss How ransomware can kill and ways to build security resilience with Chris Loehr, SVP of Solis Security. Send us a text Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Imagine setting yourself apart from the competition because your organization is always secure…
…
continue reading
1
The Dark Side - New Ways AI is used in Social Engineering.
35:58
35:58
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
35:58
Today's Cyber Flash Point is about The Dark Side - New Ways AI is used in Social Engineering. We review AI risks in social engineering, How Deep Fake Videos Increase Security Risks, and new ways to reduce risk of deep fakes. Send us a text Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at w…
…
continue reading