×
Cyber Criminals public
[search 0]
×
Best Cyber Criminals podcasts we could find (updated December 2019)
Best Cyber Criminals podcasts we could find
Updated December 2019
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
H
Hackable?
Monthly
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are.Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
D
Darknet Diaries
Monthly
 
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are.
 
Whether its terrorists, anarchists, cyber criminals or nation states, America has a target on its back. WTOP National Security Correspondent J.J. Green investigates the threats facing the U.S., the people behind them, the agencies fighting them and their impact on Americans.
 
O
OBBM Network
Weekly
 
Local business personalities on their successes, strengths, and perseverance in the marketplace to empower, inform and encourage the 80% of American micro to small businesses that tend to be family owned of 9 employees or less. Shows cover topics on business coaching, networking, health and fitness, criminal justice, cyber security, money, and veteran spotlights.
 
S
Security So What!
Monthly
 
Australian businesses were targeted with more advanced malware and cyber intrusions in 2014 than any other.We believe its time for Australian organisations to realize that we are firmly in the cross-hairs of global cyber criminals.This blog and podcast is so we can provide a platform to share stories of cyber crime from Australia and the rest of the world, and hopefully find ways Australian businesses can protect their organisation, customers and employees data from these threats.
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
Welcome to the Spotlight On Your Wealth Podcast where we explore all aspects of your financial life, brought to you by Spotlight Asset Group, a wealth management firm dedicated to Transparency, Technology, and Total Wealth.
 
We empower industry professionals with relevant real-world training to enhance their professional credentials and skill sets. We provide online courses & board certifications in the areas of Cyber Investigations, Intelligence, Counterintelligence, eCommerce Fraud, Loss Prevention, Digital & Mobile Forensics, Fraud Investigations, Cyber Crime, Human Trafficking, Deception Detection, Criminal Investigations, Leadership & more.
 
H
Hacking Humans
Weekly
 
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a heavy toll on organizations around the world. We talk to social engineering experts, security pros, cognitive scientists, and those practiced in the arts of deception (perhaps even a magician or two). We also hear from people targeted by social engineering attacks and learn from their experiences.
 
Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
Chapter 1 of the text is discussed along with a general introduction to the law
 
V
VinciWorks
Monthly
 
This podcast features the latest interview in the areas of compliance, risk management and e-learning. Topics include AML, GDPR, harassment, FCPA, anti-bribery and more. Founded in 2004, VinciWorks is a leading provider of online compliance training and risk management software. With over 200,000 users across 70 countries, VinciWorks has established itself as the definitive authority in online compliance. VinciWorks offers a range of compliance and regulatory training courses on topics such ...
 
W
War College
Weekly
 
A weekly look at the weapons systems and tactics that both endanger the world and keep it safe. 781951
 
S
St. Pete X
Monthly
 
St Pete X features business and civic leaders in St. Petersburg Florida who share their insight, expertise and love of our special city. An initiative of the St. Petersburg Group, St Pete X strives to connect and elevate the city by sharing the voices of its citizens, and to bring awareness to the opportunities offered by the great St. Petersburg renaissance.
 
Data privacy is the footprint of our existence. It is our persona beyond ourselves, with traces of us scattered from birth certificates, Social Security numbers, shopping patterns, credit card histories, photographs, mugshots and health records. In a digital world, where memory is converted to 0’s and 1’s, then instantly transformed into a reproduction even in 3D, personal data is an urgent personal and collective subject. Those who wish to live anonymous lives must take extraordinary measur ...
 
Loading …
show series
 
Shopping, banking, and even dating with your computer or Smartphone is convenient, but unfortunately it is also convenient for cyber criminals to steal from you. Knowing what the threats are and how to protect yourself may reduce your risk of becoming a victim.Our guest is Maksim Avrukin, the CEO of Digital Uppercut, a company that provides man ...…
 
Researchers at Palo Alto Networks' Unit 42 recently published research outlining attacks on home and small-business routers, taking advantage of known vulnerabilities to make the routers parts of botnets, ultimately used to attack gaming servers. Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks. ...…
 
Facebook sues a company for ad fraud. Unix-based VPN traffic is vulnerable to tampering. Russian disinformation in Lithuania. Apple explains why new iPhones say they’re using Location Services, even when Location Services are switched off. Researchers set a new record for cracking an encryption key. And ransomware hits a New Jersey theater. Dav ...…
 
We are living on the precipice of a manufacturing revolution. 3D Printing is more than just a hobby your weird rich friends use to make guns, it’s the dawn of a new process of prototype and creation. Additive manufacturing, if you believe the hype, will make it easier to make everything. Including weapons of Mass Destruction. But how real is th ...…
 
The use of artificial intelligence, machine learning and robotics has enormous potential, but along with that promise come critical privacy and security challenges, says technology attorney Stephen Wu.By BankInfoSecurity.com
 
Applying offensive hacking expertise and a more adversarial mindset to better hone not just network defenses but also public policy is proving effective, says Jeff Moss, founder and creator of the Black Hat conference.By BankInfoSecurity.com
 
The latest edition of the ISMG Security Report offers an analysis of the FBI's security and privacy warnings about smart TVs. Also featured: discussions on the security of connected medical devices and strategies for fighting synthetic identity fraud.By BankInfoSecurity.com
 
Data center operator CyrusOne sustains a ransomware attack. Another third-party breach involves a database inadvertently left exposed on an unprotected server. Buran ransomware finds its place in the black market, as does the new loader Buer. China’s Great Cannon is back and firing DDoS all over Hong Kong. Russian trolls are newly active in Lit ...…
 
In an in-depth interview, John Halamka, M.D., the former long-time CIO at Beth Israel Deaconess Medical Center in Boston, discusses his upcoming move to head Mayo Clinic's global digital health initiative in collaboration with Google - and why privacy and security are so critical to those efforts.By BankInfoSecurity.com
 
Few if any leaders of nation-states will publicly acknowledge they've been hacked, and what's worse, they won't share intelligence, even with their allies. In this episode Col. Jaak Terian, director of the NATO Cooperative Cyber Defense Centre of Excellence, explains why. Also Col. Andrew Hall, director of the Army's Cyber Institute, talks abou ...…
 
Joe shares the story of a woman losing her life savings to a scammer claiming to be from the FBI. Dave describes the $139 shed scam. The catch of the day is another threat of revealing compromising photos. Carole Theriault speaks with Chris Bush from ObserveIT about security threats from employee burnout. Links to stories: https://www.wsj.com/a ...…
 
North Korea’s Lazarus Group may have been looking for Indian reactor design information. A possible case of Russian influence operations, served up by phishing, is under investigation in the UK. The ZeroCleare wiper malware is out and active in the wild. NATO’s summit addresses cyber conflict, and a big NotPetya victim challenges insurers’ cont ...…
 
The EU's second Payments Services Directive is alive and well. But where are financial institutions now re: compliance and enforcement? James Rendell of CA Technologies, a Broadcom company, offers insight on PSD2 and EMV 3DS compliance for 2020.By BankInfoSecurity.com
 
What are the key mobile security threats to financial organizations, and how are these enterprises marshalling their mobile threat defense? These were the questions posed by ISMG and Wandera to security leaders in San Francisco. Wandera's Michael Covington discusses the response.By BankInfoSecurity.com
 
As a security leaders, too often you are brought to the table after a digital transformation project has been initiated, so you are forced to take a reactive position. But Adam Bosnian of CyberArk sees an important, proactive role for security. And a good start is by ensuring privileged access management is a key component of transformation.…
 
Someone believes, or would like others to believe, that Britain’s National Health Service is for sale to the US. There’s no word on whether the US has offered the Brooklyn Bridge in exchange. The “Quantum Dragon” study summarizes Chinese efforts to obtain quantum research results from Western institutions. The FBI says FaceApp is a security thr ...…
 
Getting the proper vendor contracts completed is a top concern for organizations preparing to comply with the California Consumer Privacy Act, says Caitlin Fennessy, research director at the International Association of Privacy Professionals.By BankInfoSecurity.com
 
In this episode of Seated2Serve, Host Jeff Bickerstaff talks with business expert Leigh Barnes about her experiences with alternative health solutions after breast cancer, and what she's come to understand about the CBD frenzy. As a successful serial entrepreneur in several different industries, Leigh was exposed to chemicals and made lifestyle ...…
 
Phishing scams that disguise malware or malicious intent in messages are extremely common. Just how do hackers keep reeling in victims? On this episode, we learn exactly how phishing works from the hacker’s perspective, and cast a phishing line of our own. For more info www.hackablepodcast.com Leave a rating or review in Apple Podcasts so we kn ...…
 
France might go on the offensive against ransomware attackers. The UK’s NCSC has been helping an unnamed nuclear power company recover from a cyberattack. A failed cyberattack targeted the Ohio Secretary of State’s website on Election Day. MixCloud confirms data breach. The Imminent Monitor RAT is shut down by law enforcement. And a cryptocurre ...…
 
Ben looks at the cozy relationship between Ring and local law enforcement, Dave shares a story about a DNA tests and search warrants. Our listener on the line wonders about deleted emails. Our guest is Michael Chertoff, former US Secretary of Homeland Security, now head of the Chertoff Group. Links to stories: https://gizmodo.com/ring-gave-poli ...…
 
In this CyberWire special edition, an extended version of our conversation from earlier this year with Peter W. Singer. We spoke not long after the publication of his book, Like War - the Weaponization of Social Media. Thanks to our special edition sponsors, McAfee.
 
In this CyberWire special edition, a conversation with John Maeda. He’s a Graphic designer, visual artist, and computer scientist, and former President of the Rhode Island School of Design and founder of the SIMPLICITY Consortium at the MIT Media Lab. His newly released book is How to Speak Machine - Computational Thinking for the Rest of Us. T ...…
 
The latest edition of the ISMG Security Report discusses new combination ransomware and doxing attacks. Plus, Twitter drops phone numbers in 2FA, and why we need to consider quantum cryptography today.By BankInfoSecurity.com
 
Earlier this year we traveled to Morocco to observe Exercise African Lion. It is an annually scheduled, multinational military exercise, with the U.S. and Morocco playing the leading roles. It's designed to improve interoperability, mutual understanding and prepare for the possibility that the two countries and other allies would need to collab ...…
 
A Fullz House for Thanksgiving. Google finds that nation-state phishing continues at its customary high levels. DeathRansom, the low-end ransomware that didn’t actually encrypt files, has now begun to do so. The Stantinko botnet adds cryptomining functionality. Microsoft reflects on Dexphot, and the sophistication it brings to ordinary malware. ...…
 
Happy Thanksgiving and thanks for tuning into this special podcast. Last week was a busy one for President Trump and the military. Secretary of the Navy Richard Spencer was fired. Or did he quit? No, he was fired. Why? Because of how he handled controversy surrounding Navy SEAL and accused War Criminal Eddie Gallagher. That’s … that’s if he was ...…
 
All healthcare industry stakeholders must take critical steps to address the cybersecurity of connected medical devices, says Jennifer Covich Bordenick, CEO of of the eHealth Initiative and Foundation, an advocacy group that has issued a new report on the subject.By BankInfoSecurity.com
 
Twitter and Facebook warn of potentially malicious software development kits being used by app developers to, potentially, harvest and monetize users’ data. Nursing homes affected by a third-party ransomware incident receive extortion demands that amount to some $14 million. THe Hollywood Reporter retails skeptical musings about the Sony Pictur ...…
 
Credit card skimming is growing in popularity. Gas pumps all over are seeing skimmers attached to them. It’s growing in popularity because it’s really effective. Hackers have noticed how effective it is and have began skimming credit cards from websites. Guest Thanks to Yonathan Klijnsma from RiskIQ. Yonathan has fallen on hard times and could ...…
 
Credit card skimming is growing in popularity. Gas pumps all over are seeing skimmers attached to them. It’s growing in popularity because it’s really effective. Hackers have noticed how effective it is and have began skimming credit cards from websites. Guest Thanks to Yonathan Klijnsma from RiskIQ. Yonathan has fallen on hard times and could ...…
 
Credit card skimming is growing in popularity. Gas pumps all over are seeing skimmers attached to them. It’s growing in popularity because it’s really effective. Hackers have noticed how effective it is and have began skimming credit cards from websites. Guest Thanks to Yonathan Klijnsma from RiskIQ. Yonathan has fallen on hard times and could ...…
 
A defection and a leak expose Chinese espionage and social control operations. Data aggregation and enrichment seem to underlie a big inadvertent data exposure. Something seems to be up in Kazakhstan’s networks. The US FCC takes a swing at Huawei and ZTE. Russia moves closer to its desired Internet sovereignty. A Chuckling Squad member is in cu ...…
 
In this episode of Tricks of The Trade, Host Stephanie Chavez sits down with The Trade Group's Videography and Motion Graphics Specialist, Chris Skupien. Chris has a news background, and has been instrumental editing Home & Garden TV, as well as video for his current position. Stephanie puts on her Marketing Director hat and asks Chris to expla ...…
 
Election hacking is not just a US issue; it's a hot topic for every global democracy. And Joseph Carson of Thycotic is concerned that too many people are focused on the wrong elements of this topic. He analyzes the specific hacking techniques that demand attention.By BankInfoSecurity.com
 
Researchers at Anomali have been tracking China-based threat group, Mustang Panda, believing them to be responsible for attacks making clever use of Windows shortcut files. Parthiban is a researcher at Anomali, and he joins us to share their findings. The research is here: https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minor ...…
 
Google researchers provide a Sandworm update. Internet sovereignty considered: an aid to law enforcement or a means of social control. LinkedIn reports on the 21-million bogus accounts it closed over the past year. Teacher becomes pupil as marketing learns from informaiton operators. Ohio man gets six years in Akron DDoS case. Ransomware case u ...…
 
This edition of the ISMG Security Report features an analysis of the very latest ransomware trends. Also featured: Discussions of Microsoft's move to DNS over HTTPS and strategies for tackling IoT security challenges.By BankInfoSecurity.com
 
Refined Kitten seems to be up to something, perhaps in the control system world. Microsoft debunks claims about Teams, BlueKeep, and Doppelpaymer ransomware. The FBI warns the auto industry that it’s attracting attackers’ attention. A new attack technique, RIPlace, is described. Phineas Fisher’s bouty, considered. The UN, the AG, and the course ...…
 
Have you ever heard of the Dossier Center or Bellingcat? They're two of the preeminent online investigative journalism groups in the world. Quite often Russian corruption is their target. On this edition of Target USA, we'll take a look at exactly what they do, what the risks are, and how they're trying to get at their targets -- which often in ...…
 
Dave wonders about Juice Jacking warnings. Joe shares findings from Agari's latest email fraud and identity deception report. The catch of the day promises romance in exchange for airline tickets. Our guests are David Spark and Allan Alford, cohosts of the Defense in Depth podcast. Links to stories: https://www.goodmorningamerica.com/travel/sto ...…
 
Louisiana works to recover from Monday’s ransomware attack. The HydSeven criminal group is delivering Trojans via spearphishing. A hotel reservation company sustained a massive data exposure. India’s government says it’s legally permitted to surveil citizens’ devices when it’s deemed necessary. Google, Facebook, Apple, and Amazon answer questio ...…
 
Refugees. People from countries in crisis fleeing oppression and death. America was once a beacon to the world’s tired, poor, huddled masses yearning to breathe free. But things have changed. In the last term of President Barack Obama the U.S. said it would accept 110,000 refugees. That number is now just 18,000. There’s a moral argument here, ...…
 
Numerous regulations and standards have been introduced globally to help curtail online fraud. What makes EMV 3D Secure stand out? Matt Cooke and Paul Dulany of Broadcom weigh in on the implementation and benefits of EMV 3DS.By BankInfoSecurity.com
 
Louisiana recovers from a ransomware attack against state servers. North Korea appears to still be interested in Indian industry--this time it’s people looking for jobs at Hindustan Aeronautics. Compromised CMS distributing info-stealing Trojans. HydSeven mounts a cross-platform spearphishing campaign. Macy’s and Magecart. Thoughts on supply ch ...…
 
While IoT devices are entering enterprises at a rapid pace, the security practices around them are as much as 20 years behind those for enterprise computing, says Sean Peasley of Deloitte, who outlines steps organizations can take to ensure safe IoT computing.By BankInfoSecurity.com
 
Cloud solutions, the mobile workforce, the skills gap - these are among the security impacts that don't get enough attention when discussing digital transformation. David Ryder of Avast Business opens up on these topics.By BankInfoSecurity.com
 
The Kortkamp Group's Larry Kortkamp joins Host Jeff Bickerstaff on Seated2Serve for an insightful discussion on business improvement. The same things that helped you start your business are often the same things that hold a business back when it's time to grow. Enable employees to prosper and grow. It's important to be able to release control a ...…
 
The more people shop online, the more thieves swipe packages. Are smart padlocks a secure solution? Or can they be cracked open by hackers? On this episode, Geoff joins the McAfee Advanced Threat Research team for some technical porch piracy. For more info www.hackablepodcast.com Leave a rating or review in Apple Podcasts so we know what you think.…
 
Disney+ credentials already on sale in the black market souks. India reassures nuclear power partners that the Kudankulam incident didn’t compromise safety. Documents pertaining to Chinese and Iranian security operations leak. Internet restrictions go into force in Iran and Venezuela. Russia offers an Internet control treaty at the UN. The Liza ...…
 
Google login Twitter login Classic login