show episodes
 
Meet Alice -- a burnt-out barista who turns to the Dark Web to pay off her student debt. When she attempts her first-ever cyber crime, everything goes according to plan -- until she is pulled in deeper than she could have ever imagined. Can Alice get out before it’s too late? The Hacker Chronicles is an original series created by the team at Tenable.
 
It aims at creating awareness around hackers stealing financial information and how cyber crime continues to evolve, with new threats surfacing every year. They can, in effect, destroy businesses and damage your financial and personal lives — especially if you’re the victim of identity theft. Cyber attacks are an evolving danger to organizations, employees and consumers. They may be designed to access or destroy sensitive data or extort money. At Hidden Files, hope listeners will be able to ...
 
“In 2014, Alberto Daniel Hill, an expert in cybersecurity, found a security issue in a medical provider’s website. In reporting the issue, it led him to become the first person imprisoned in Uruguay for a computer-related crime—a crime he didn’t commit, and one that probably never even happened." I am Alberto and this podcast is about my story, cybersecurity and hackers. https://podcast.darkweb.today/ https://twitter.com/ADanielHill https://twitter.com/Darkwebtoday https://darkweb.today http ...
 
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
 
Let us dive into the world of corporate integrity, ethical leadership, and its success factors. Without being sensitised, we quickly find ourselves surrounded by different patterns of white-collar crime, non-compliance, and cyber-crime. Compressed knowledge in easily digestible doses to protect your company, your employees, your customers, and yourself - as a business leader or entrepreneur. Are you a decision-maker? A game changer towards corporate integrity and ethical leadership? The podc ...
 
Reformed Hacker Bastien Treptel and the Team at CTRL Group take us through managing our cyber risks and security in an age where cyber-attacks can be carried out with ease. Detailing risks in the Start-Up, SME industries and cloud services as well as giving us an insight into how secure we are in our very own homes. For more episodes download the free LiSTNR app
 
The Impact: Coronavirus and Organized Crime is a special edition weekly podcast from the Global Initiative Against Transnational Organized Crime. We'll look at how the ongoing COVID-19 virus is impacting on organized crime around the world and how the illicit economy may affect our ability to respond to the virus. We'll be covering cyber crime, the illegal wildlife trade, counterfeit medicines, drug trafficking, human smuggling, corruption and human trafficking. This podcast uses the followi ...
 
The Cyber Crime Report. The show that discusses and educates the public about online and offline security recommendations in today's world. The show that deals with computer related and national security, cyber crime, and areas affiliated with your personal and corporate safety. For more information, please goto www.jbm.net. and www.thecybercrimereport.com. Safe Surfing. Please rate our show. Sign up for our weekly newsletter for perils of wisdom in this growing and exponential problem in No ...
 
Join us as we unleash the latest innovations in science and tech to showcase engineering that is saving our planet and helping communities across the globe. From shark detection technology and artificial reefs bringing back marine wildlife, to the latest real-life cyber crime, nano materials and smart watches are saving lives, you can get thinking about what will be next. Kick start your way to making a difference and engineering a better world. Join us on social media @IETeducation for all ...
 
We empower industry professionals with relevant real-world training to enhance their professional credentials and skill sets. We provide online courses & board certifications in the areas of Cyber Investigations, Intelligence, Counterintelligence, eCommerce Fraud, Loss Prevention, Digital & Mobile Forensics, Fraud Investigations, Cyber Crime, Human Trafficking, Deception Detection, Criminal Investigations, Leadership & more. See acast.com/privacy for privacy and opt-out information.
 
F
FINCast

1
FINCast

K2 Integrity

Unsubscribe
Unsubscribe
Monthly
 
FINCast is an exciting hub of conversation encompassing the world's most pressing financial integrity-related issues, including anti-money laundering/counter-terrorist financing (AML/CFT), anti-bribery and corruption, financial and cyber crime vulnerabilities, and fin-tech and new technologies.
 
Our laws and ethical practices have evolved over centuries. But today, tech is on an exponential curve and is affecting practically everyone—everywhere, pulling society from its roots and reordering the way we live. Amidst these changes, how do we make sure our laws keep pace with the times? Join Yves Faguy of CBA National in conversation with leading legal minds and practitioners exploring this question. -- Nos lois et nos pratiques en matière d'éthique ont évolué au fil des siècles. Mais a ...
 
Australian businesses were targeted with more advanced malware and cyber intrusions in 2014 than any other. We believe its time for Australian organisations to realize that we are firmly in the cross-hairs of global cyber criminals. This blog and podcast is so we can provide a platform to share stories of cyber crime from Australia and the rest of the world, and hopefully find ways Australian businesses can protect their organisation, customers and employees data from these threats.
 
In a world where we are so dependent on our phones, our computers and the internet, we explore what happens when you don't protect yourself online. Criminal Domain will expose the ways we leave ourselves open to potential hacking and phishing attacks, and how perpetrators use technology to manipulate us. World renowned futurist Mark Pesce and respected investigative journalist Claire Aird speak to victims of cyber crime to inform us how to better protect ourselves online.
 
Award-winning journalist Katrina Daniel welcomes you to Prime Time Crime — a podcast for true crime fans who want to know what goes on behind-the-scenes of trending and the always classic, true crime stories. What really happened, what do we know, what might be going on in the minds of those involved? Guests include forensic specialists, detectives, psychologists, crime reporters, renowned federal prosecutors and criminal defense attorneys. Join Katrina every Thursday for a deep dive talk ab ...
 
This page is designed to provide consumers with the information needed to conduct business and personal transactions safely, honestly and with a keen ability to spot a scam in the making. As one of our country’s oldest federal law enforcement agencies, founded by Benjamin Franklin, the United States Postal Inspection Service has a long, proud, and successful history of fighting criminals who attack our nation’s postal system and misuse it to defraud, endanger, or otherwise threaten the Ameri ...
 
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
 
We help entrepreneurs and brands create a positive brand awareness experience by humanizing their brand. The following Podcasts are hosted by B Live Media: The Conversation Writers Corner Live Show Books with Bridgetti Water Hour Responsible Social Media and Cyber Crime CuppaChino Club - Empowered Women Do Good Live
 
From ATM Skimming to Human Trafficking, The Protectors Podcast takes you inside the minds of criminals from around the world with leading experts and the investigators who put them behind bars. Presented by the International Association of Financial Crimes Investigators (IAFCI), and hosted by International President, Mike Carroll, and International VP, Mark Solomon, The Protectors is a bi-weekly podcast that aims to educate consumers on the fraud, financial, and cybercriminal activities that ...
 
To Catch A Hacker is an audio series about cybercrime, what really happens, how we find the people behind the crimes, and how they are brought to justice. Each season follows the story of a cybercrime and tracks the case until it is solved. But these cases are the success stories. We know one in four American households are victimized by cybercrime. Most never report what happened to the police. Of the tiny fraction that ARE reported, only 3 in 1000 incidents ever see an arrest. This makes c ...
 
D
Data Privacy Detective

1
Data Privacy Detective

Joe Dehner - Global Data Privacy Lawyer

Unsubscribe
Unsubscribe
Monthly
 
Data privacy is the footprint of our existence. It is our persona beyond ourselves, with traces of us scattered from birth certificates, Social Security numbers, shopping patterns, credit card histories, photographs, mugshots and health records. In a digital world, where memory is converted to 0’s and 1’s, then instantly transformed into a reproduction even in 3D, personal data is an urgent personal and collective subject. Those who wish to live anonymous lives must take extraordinary measur ...
 
I
ISF Podcast

1
ISF Podcast

Information Security Forum Podcast

Unsubscribe
Unsubscribe
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
 
Loading …
show series
 
On today's show, Mike and Mark welcome Michael Fasanello. Michael is a private sector compliance executive and thought leader specializing in Anti-Money Laundering (AML), Counter-Terrorist Financing (CTF), global sanctions, and other illicit finance, with a current focus on the digital assets and blockchain technology space. In this episode, Michae…
 
Mark Horne, Chief Marketing Officer at Pindrop, joins Dave to discuss voice authentication, Dave and Joe have some follow up about business phishing (BECs) from listeners Nick and Michael, Joe's story has a romance scam where criminals pretend to be celebrities, and Dave's story is about the increase in phishing downloads due to cyber criminals usi…
 
CISA and the Multi-State Information Sharing & Analysis Center (MS-ISAC), are releasing this joint Cybersecurity Advisory in response to active exploitation of CVE-2022-1388. This vulnerability is a critical iControl REST authentication bypass vulnerability affecting multiple versions of F5 Networks BIG-IP. AA22-138A Alert, Technical Details, and M…
 
Chaos ransomware group declares for Russia. Hacktivists claim to have compromised Russian-manufactured ground surveillance robots. Conti's ongoing campaign against Costa Rica. The claimed "international" cyberattack against Nile dam was stopped. Rick Howard speaks with author Caroline Wong on her book “Security Metrics, a Beginner's Guide”. Our gue…
 
On this episode of Inside the FBI, learn how the FBI's Law Enforcement Officers Killed and Assaulted Data Collection leverages data to help law enforcement officers protect themselves from becoming statistics. For a full transcript and additional resources, visit fbi.gov/podcasts/. If you work in law enforcement, you can email osat@fbi.gov to reque…
 
When Vladimir Putin needs mischief made in cyberspace, he taps Fancy Bear. This hacking group has conducted cyber attacks on the Ukraine, the DNC, French elections and more. They've waged cyber war on a global scale. Created, Produced & Hosted by Keith Korneluk Written & Researched by Jim Rowley Edited, Mixed & Mastered by Greg Bernhard Theme Song …
 
Picture of the Week. An "eventful" Patch Tuesday. Patch Tuesday. Apple patched a 0-day. Google's "Open Source Maintenance Crew". Conti suggests overthrowing the new Costa Rican government. Policing the Google Play Store. The situation has grown more dire for F5 systems' BIG-IP boxes. Errata. Closing The Loop. SpinRite. The New EU Surveillance State…
 
Picture of the Week. An "eventful" Patch Tuesday. Patch Tuesday. Apple patched a 0-day. Google's "Open Source Maintenance Crew". Conti suggests overthrowing the new Costa Rican government. Policing the Google Play Store. The situation has grown more dire for F5 systems' BIG-IP boxes. Errata. Closing The Loop. SpinRite. The New EU Surveillance State…
 
This joint cybersecurity advisory was coauthored by the cybersecurity authorities of the US, Canada, New Zealand, the Netherlands, and the UK. Cyber actors routinely exploit poor security configurations, weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joi…
 
An assessment of the Russian cyber threat. NATO's Article 5 in cyberspace. Conti's ransomware attack against Costa Rica spreads, in scope and effect. Bluetooth vulnerabilities demonstrated in proof-of-concept. CISA and its international partners urge following best practices to prevent threat actors from gaining initial access. Joe Carrigan looks a…
 
Daniel Kelley (https://twitter.com/danielmakelley) was equal parts mischievousness and clever when it came to computers. Until the day his mischief overtook his cleverness. Sponsors Support for this show comes from Keeper Security. Keeper Security’s is an enterprise password management system. Keeper locks down logins, payment cards, confidential d…
 
In this episode, ISF CEO Steve Durbin and host Tavia Gilbert discuss highlights from the interviews featured over the last several weeks. They consider some of Steve’s takeaways and actionable insights for security professionals from Season 11. Mentioned in this episode: PWC Report: Overseeing cyber risk: the board’s role Protecting the Crown Jewel…
 
Users are advised to patch Zyxel firewalls. Battlefield failure and popular morale in Russia’s hybrid war. Nuisance-level hacktivism in the hybrid war. Sweden and Finland move closer to NATO membership; concern over possible Russian cyberattacks rises. Intelligence, disinformation, or wishful thinking? Conti calls for rebellion in Costa Rica. PayOr…
 
According to the zero trust philosophy, we all assume that our networks are already compromised and try to design them to limit the damage if it turns out to be so. In this episode of CyberWire-X, we’ve invited subject matter experts, Amanda Fennell, the Chief Information Officer and Chief Security Officer of Relativity, and Galeal Zino, CEO of epi…
 
Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking into a network with a friend, he was bitten b…
 
Dr. May Wang, Chief Technology Officer at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infus…
 
Ukraine holds its first war crimes trial. Are there war crimes in cyberspace? Iranian cyberespionage (and a possible APT side-hustle). Roblox seems to have been used to introduce a backdoor. CISA issues ICS advisories. Darkweb C2C trader sentenced. The last conspirator in the strange case of the eBay newsletter takes a guilty plea. Carole Theriault…
 
Tech Tent speaks to Marcus Hutchins, the British cyber security expert who singlehandedly stopped the Wannacry attack. The BBC's cyber reporter Joe Tidy and the cyber expert Lisa Forte discuss Wannacry's legacy. Also this week why Russians are resorting to medieval memes to express dissent about the war in Ukraine, how Tiktok is transforming Eurovi…
 
Killnet hits Italian targets. Access to RuTube is restored. Hacktivism in the hybrid war. Emotet surges. Clearing up the confusion of NPM dependency confusion attacks. Tim Eades from Cyber Mentor Fund on finding the right investors. Our guest is Michael DeBolt of Intel 471 on the growing interest in Biometrics in the criminal underground. And cyber…
 
The cybersecurity authorities of the UK, Australia, Canada, New Zealand, and the US have observed a recent increase in malicious cyber activity against managed service providers (MSPs). Allied cybersecurity authorities expect state-sponsored cyber actors to increase their targeting of MSPs in an attempt to exploit provider-customer trust relationsh…
 
Yves Faguy speaks with Wissam Aoun about our IP laws and their fitness for purpose in the digital era. Aoun is the Acting Associate Dean at Windsor Law. He’s also an assistant professor focusing his research on patent law, professional regulation and governance. He has previously taught copyright law and trademark law. Aoun is also the new co-edito…
 
Suspected murderer, Casey White, and Vicki White, the prison guard who helped him escape as they fled a small jail house in Lauderdale, Alabama where Casey was waiting to go to trial for viciously murdering a woman. Already sentenced — and serving — 75 years for a slew of violent crimes; Facing the death penalty. During that time, he'd created a re…
 
Matthew Connor, Founder of Conscious Security, discusses a study he conducted while working with F-Secure, the study targeted 82,402 individuals with one of four phishing emails, he goes into the findings of the study and certain insight this study has brought, Joe's story is on the popular app Zelle and how users are loosing thousands of dollars d…
 
There’s international consensus on the cyberattack against Viasat. Kaspersky remains under investigation. The Nerbian RAT is out. NPM dependencies are exploited, but to what end? Caleb Barlow examines Russia’s future on the internet. Our guest is Deepen Desai from Zscaler with the latest phishing research. And new advisories from CISA and its partn…
 
Picture of the Week. Google updates Android to patch an actively exploited vulnerability. Connecticut's recently passed data privacy bill became law last Wednesday. Ransomware victim snapshot. US State Department offering $10 million reward for information about Conti members. The worst threat the US faces... The White House and Quantum Computers. …
 
Picture of the Week. Google updates Android to patch an actively exploited vulnerability. Connecticut's recently passed data privacy bill became law last Wednesday. Ransomware victim snapshot. US State Department offering $10 million reward for information about Conti members. The worst threat the US faces... The White House and Quantum Computers. …
 
A quick introductory note on Russia’s hybrid war against Ukraine. Russian television schedules hacked to display anti-war message. Phishing campaign distributes Jester Stealer in Ukraine. European Council formally attributes cyberattack on Viasat to Russia. Costa Rica declares a state of emergency as Conti ransomware cripples government sites. DCRa…
 
A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-development Audio reference link: “Creating Video Games - Agile Software Development,” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 Decemb…
 
In todays episode I talk about why the right team set up will let you achieve outstanding achievements. Whenever you are in the situation to build the best team for a delicate project one of the advice, we share in our peer group is “don’t look at the obvious data only”. This is also true when you have to set up your investigations team – no matter…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login