Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
Cyber Crime Junkies

Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

Star filled black icon

5.0

(3)

Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast

profile image
profile image

2 Listeners

Star filled black icon

5.0

(3)

bookmark
Share icon

All episodes

Best episodes

Seasons

Top 10 Cyber Crime Junkies Episodes

Goodpods has curated a list of the 10 best Cyber Crime Junkies episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Cyber Crime Junkies for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Cyber Crime Junkies episode by adding your comments to the episode page.

Cyber Crime Junkies - What Employers Want in Security. Mike Miller.
play

09/22/22 • 47 min

What Employers Want for Cybersecurity Careers. Expert Mike Miller.
BONUS VIDEO EPISODE
HERE.
Join us as we learn some unique approaches to entering the cybersecurity field and leveraging key social media platforms with author and expert, vCISO Mike Miller. Mike has a great new book "Break Into Cyber" showing us how to break into the field. You can grab your copy here: https://www.breakincyber.com/

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

profile image
profile image

2 Listeners

bookmark
plus icon
share episode
Cyber Crime Junkies - The Biggest Breach In History. What You Need to Know.
play

10/06/22 • 44 min

Today’s True Cyber Crime story is about a single click. A single distraction. The result was the largest data breach in the history of the internet. See how it happened, how espionage, foreign spies and questionable methods of communication plagued the company breached.

Also learn what specific steps we all need to take today considering this breach and others.

This is the true cyber crime story of YAHOO. See more episodes and cool stuff at CyberCrimeJunkies.com

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

profile image

1 Listener

comment icon

1 Comment

1

bookmark
plus icon
share episode

Summary
This episode explores the true cybercrime story of Michael Calce, also known as Mafia Boy, who was responsible for taking down major websites like Yahoo, E-Trade, eBay, and more during the dot com bubble. Michael's journey into hacking began when he received his first computer at the age of six and became fascinated with the idea of controlling and commanding it. He joined an elite Russian hacker group called TNT and used their resources to carry out his attacks. Despite covering his tracks, Michael was eventually caught due to his bragging in IRC chat rooms. He was sentenced to probation and has since become an ethical hacker, raising awareness about cybersecurity.

Chapters

  • 00:00 Introduction: The Early Years of Michael Calce
  • 06:39 Joining the TNT Hacker Group
  • 18:29 The Takedown: Bringing Down Major Websites
  • 23:26 The Arrest and Aftermath
  • 28:10 The Changing Landscape of Hacking
  • 29:05 Conclusion: From Cybercriminal to Ethical Hacker

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

profile image

1 Listener

bookmark
plus icon
share episode
Cyber Crime Junkies - AI Changing Security Awareness Training
play

06/14/23 • 57 min

New Video Episode: https://youtu.be/qKxTpMvrZoQ
Benjamin Netter, Security expert, Hacker, Investor & Entrepreneur share how ai is changing how we train people in security awareness. He joins us today discussing innovative ways to build a security culture and leveraging AI for security awareness. Benjamin is the Founder of RIOT. Located online at https://Tryriot.com founded in Jan 2020 a next generation unique platform to building a security culture.

Benjamin/RIOT evolved into customized educational content that grow a cybersecurity culture supporting over 100K employees globally.

Riot’s main interface is a chatbot called Albert, which is available on Slack, Microsoft Teams and the web. Its cybersecurity courses are interactive, with content that dynamically changes depending on each employee’s cybersecurity knowledge.

Topics:

How Ai Is Changing How We Train People In Security Awareness, Leveraging Ai For Security Awareness, How To Use Ai For Security Awareness, Innovative Ways To Build A Security Culture, Best Ways To Create A Security Culture, How To Use Ai To Protect From Phishing, How To Use Ai For Cyber Security Awareness, How To Use Ai To Improve Cyber Security, How Young Leaders Help Culture, New Approach To Build A Security Culture, New Tips On How To Create A Security Culture, How To Train On Using Ai Securely, Best Way

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

bookmark
plus icon
share episode

New Insight on Operational Resiliency and Crises Management. Top security tips we all want to know.
VIDEO EPISODE HERE
Got Policies? Do you feel many organizations do not have the proper policies in place to protect their brand? It appears many we speak with tend to struggle to have all the necessary ones. Most have never conducted any exercise to test them and identify gaps.
We sat down with Lester Chng, CISSP, former Naval Officer who learned a great deal about WAR GAES in the military and sees the benefits to large enterprise and SMB clients to practice executing their policies before reality sets in. He shared his practices for addressing this. He has significant recommendations for addressing the four (4) main areas of security:

1. Cyber

2. Phys

3. Fraud

4. Crises management

Lester Chng has a very cool story he shared with us. It’s a story of immigration (from Singapore to Canada), one of military career transition into civilian life and breaking into the cybersecurity field and his story is built on a foundation of grit. He is passionate about crises management exercises and the practice since it always identifies holes and gaps in policies.

Come try Blushingintrovert.com. Portion of all sales go to Mental Health Awareness efforts.

Support the show

We Really would love it if you could SUBSCRIBE to our new Youtube Channel, PLEASE! http://www.youtube.com/@cybercrimejunkiespodcast

We welcome Apple Podcast 5-Star Reviews! https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941

Explore More Podcast Content at https://cybercrimejunkies.com

Don't miss our Newsletter (no email needed!) VIGILANCE-Translating Cyber into Business. linkedin.com/newsletters/6941459114879311872

Shop our Small Business Sponsor, Blushing Introvert, Women comfort clothes, plushies with portion of all sales going to Mental Health Research. https://blushingintrovert.com

Want to try podcasting yourself? Use RIVERSIDE today! We use it (after trying every other platform and we LOVE it) Sign up here today! https://www.riverside.fm/?utm_campaign=campaign_5&utm_medium=affiliate&utm_source=rewardful&via=cybercrimejunkies


bookmark
plus icon
share episode
Cyber Crime Junkies - Human Story Behind Ransomware. Exclusive. Jon DiMaggio.
play

05/17/23 • 63 min

Jon DiMaggio of Analyst 1 shares exclusive insight into the human story behind ransomware from the blockbuster release of Ransomware Diaries Volume 2 discussing the people behind ransomware attacks
We Discuss:
💡the human story behind ransomware,
💡Getting To Know The People Behind Ransomware,
💡why its important to understand cyber crime motives,
💡how to understand cyber crime motives,
💡understanding cyber crime motives,
💡why its important to understand cyber crime mo,
💡what it means to profile a criminal,
💡exposing people who cause ransomware attacks,
💡profiling the people who cause ransomware attacks,
💡understanding the people who cause ransomware attacks,
💡the people who cause ransomware attacks,
💡getting to know the people behind ransomware attacks,
💡who causes ransomware attacks,
💡behind scenes cyber criminals,
💡behind the mask cyber crime gangs, cyber crime gang discussions,
💡cyber crime gang under cover, cyber crime gangs under cover,
💡examples of cyber crime gang activities, examples of recruiting in cyber crime gangs,
💡exposed secrets of cyber crime gangs,
💡exposing cyber crime gang activities,
Full Video Episode: https://youtu.be/9t23ovSL29A
Audio Podcast: Available Everywhere.
Thanks for Listening and Watching.
PLEASE CONSIDER SUBSCRIBING. It's FREE and it will help us to help others.

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

bookmark
plus icon
share episode

A New Understanding of the Science of Social Engineering. Expert Chris Hadnagy. VIDEO EPISODE HERE.

A Must-watch/Listen episode! We discuss key topics of Social Engineering:

  • · Non-verbal communication
  • · Science of Brain Neuroscience
  • · Manipulation versus Influence
  • · Strategic Empathy

Chris Hadnagy is a professor at Univ of AZ, best-selling author and CEO of Social-Engineer, LLC and The Innocent Lives Foundation.

We discussed Chris’ first social engineering framework he created.

We review his best-selling books, and you can find out more here.

www.social-engineer.com

www.innocentlivesfoundation.org
Thanks for being a Cyber Crime Junky.

Support the show

Thank you listening! Come Watch the Video episode!Please consider subscribing to our YouTube Channel for ALL Video episodes.
It's FREE. It helps us help others.

Our YouTube Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg


bookmark
plus icon
share episode
Cyber Crime Junkies - UBER Crime Story 2. How Security Leaders Can be Liable.
play

03/12/24 • 61 min

This episode delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, discussing how Security Leaders can be liable.
This conversation discusses the Uber breach and the ongoing trial of Joseph Sullivan, the former chief security officer of Uber The conversation explores how the hacker gained access and the potential ways the breach could have been prevented. The trial of Joseph Sullivan is also discussed, with differing opinions on his actions and the verdict. The conversation highlights the impact of the breach and trial on the cybersecurity community.

Takeaways

  • · The breach raises questions about the effectiveness of security measures and the need for regular penetration testing.
  • · The ongoing trial of Joseph Sullivan, the former chief security officer of Uber, highlights the potential personal liability of cybersecurity leaders.
  • · The breach and trial have had a significant impact on the cybersecurity community, leading to a reevaluation of roles and responsibilities.

Chapters PART 2

  • 1:01 Trial of Joseph Sullivan
  • 2:01 Uber's Awareness of the Breach
  • 3:00 Hacker's Access and Screenshots
  • 4:19 How the Hacker Gained Access
  • 7:15 Understanding Hackers
  • 13:40 Multifactor Authentication Fatigue

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

bookmark
plus icon
share episode
Cyber Crime Junkies - How Parents Can Protect Children Online.
play

09/02/24 • 58 min

Titania Jordan. Best-selling author, CMO of Bark, and regular TV Guest on national TV shows, Titania Jordan, joins us to discuss Parenting in a Tech World.
We discuss:

  • Common misconceptions and Parental Challenges today
  • The Role and Responsibilities Social Media companies have and should have
  • Best Practices and Practical Suggestion to manage the tech your children are using
  • How to Monitor their online activity without invading their privacy
  • Warnings signs to look for
  • Markers indicating more significant behaviors.

Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

bookmark
plus icon
share episode
Cyber Crime Junkies - Latest Uber Trial and Arrest News. New Powerpoint Warning.
play

09/09/22 • 34 min

Latest Uber Trial and Arrest News. New Powerpoint Warning.
Blockbuster witness testimony exposed. Plus Breaking news on the
Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes use of mouse movement in decoy Microsoft PowerPoint documents to deploy malware.
Check out our new Marketplace now available on CyberCrimeJunkies.com

Want EXCLUSIVE content? We now have have a special offer for those who want Exclusive Member-Only benefits! Subscribe here and sign up for Prime Access Today! (https://glow.fm/cybercrimejunkiesprime/) Get EXCLUSIVE Special Resources, Career Guidance, Cool Documentaries, Exclusive VIDEO Episodes, & Proprietary Security Trainings!

Interested in Trying BARK to protect your Family Online? Use Our Code to sign up and get a 7-day Free Trial and save 41%
Code: Sign up here Our Link https://www.bark.us/?ref=MXQHQBJ

or use our Cyber Crime Junkies PROMO CODE: MXQHQBJ
We use Bark to Protect our Families. Let us know how you enjoy it!

Support the show
bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does Cyber Crime Junkies have?

Cyber Crime Junkies currently has 232 episodes available.

What topics does Cyber Crime Junkies cover?

The podcast is about News, Stories, Brand, Management, Leadership, Business News, Podcasts, Truecrime and Business.

What is the most popular episode on Cyber Crime Junkies?

The episode title 'What Employers Want in Security. Mike Miller.' is the most popular.

What is the average episode length on Cyber Crime Junkies?

The average episode length on Cyber Crime Junkies is 47 minutes.

How often are episodes of Cyber Crime Junkies released?

Episodes of Cyber Crime Junkies are typically released every 2 days, 9 hours.

When was the first episode of Cyber Crime Junkies?

The first episode of Cyber Crime Junkies was released on Jul 21, 2022.

Show more FAQ

Toggle view more icon

Comments