Cyber Crime Junkies
Cyber Crime Junkies. Host David Mauro.
5.0
(3)
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
2 Listeners
5.0
(3)
All episodes
Best episodes
Seasons
Top 10 Cyber Crime Junkies Episodes
Goodpods has curated a list of the 10 best Cyber Crime Junkies episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Cyber Crime Junkies for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Cyber Crime Junkies episode by adding your comments to the episode page.
What Employers Want in Security. Mike Miller.
Cyber Crime Junkies
09/22/22 • 47 min
What Employers Want for Cybersecurity Careers. Expert Mike Miller.
BONUS VIDEO EPISODE HERE.
Join us as we learn some unique approaches to entering the cybersecurity field and leveraging key social media platforms with author and expert, vCISO Mike Miller. Mike has a great new book "Break Into Cyber" showing us how to break into the field. You can grab your copy here: https://www.breakincyber.com/
Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.
A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
2 Listeners
The Biggest Breach In History. What You Need to Know.
Cyber Crime Junkies
10/06/22 • 44 min
Today’s True Cyber Crime story is about a single click. A single distraction. The result was the largest data breach in the history of the internet. See how it happened, how espionage, foreign spies and questionable methods of communication plagued the company breached.
Also learn what specific steps we all need to take today considering this breach and others.
This is the true cyber crime story of YAHOO. See more episodes and cool stuff at CyberCrimeJunkies.com
Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.
A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
1 Listener
1 Comment
1
From Hacker to Hero: The Michael Calce Story – How 'Mafia Boy' Took Down The Internet
Cyber Crime Junkies
07/15/24 • 32 min
Summary
This episode explores the true cybercrime story of Michael Calce, also known as Mafia Boy, who was responsible for taking down major websites like Yahoo, E-Trade, eBay, and more during the dot com bubble. Michael's journey into hacking began when he received his first computer at the age of six and became fascinated with the idea of controlling and commanding it. He joined an elite Russian hacker group called TNT and used their resources to carry out his attacks. Despite covering his tracks, Michael was eventually caught due to his bragging in IRC chat rooms. He was sentenced to probation and has since become an ethical hacker, raising awareness about cybersecurity.
Chapters
- 00:00 Introduction: The Early Years of Michael Calce
- 06:39 Joining the TNT Hacker Group
- 18:29 The Takedown: Bringing Down Major Websites
- 23:26 The Arrest and Aftermath
- 28:10 The Changing Landscape of Hacking
- 29:05 Conclusion: From Cybercriminal to Ethical Hacker
Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
1 Listener
AI Changing Security Awareness Training
Cyber Crime Junkies
06/14/23 • 57 min
New Video Episode: https://youtu.be/qKxTpMvrZoQ
Benjamin Netter, Security expert, Hacker, Investor & Entrepreneur share how ai is changing how we train people in security awareness. He joins us today discussing innovative ways to build a security culture and leveraging AI for security awareness. Benjamin is the Founder of RIOT. Located online at https://Tryriot.com founded in Jan 2020 a next generation unique platform to building a security culture.
Benjamin/RIOT evolved into customized educational content that grow a cybersecurity culture supporting over 100K employees globally.
Riot’s main interface is a chatbot called Albert, which is available on Slack, Microsoft Teams and the web. Its cybersecurity courses are interactive, with content that dynamically changes depending on each employee’s cybersecurity knowledge.
Topics:
How Ai Is Changing How We Train People In Security Awareness, Leveraging Ai For Security Awareness, How To Use Ai For Security Awareness, Innovative Ways To Build A Security Culture, Best Ways To Create A Security Culture, How To Use Ai To Protect From Phishing, How To Use Ai For Cyber Security Awareness, How To Use Ai To Improve Cyber Security, How Young Leaders Help Culture, New Approach To Build A Security Culture, New Tips On How To Create A Security Culture, How To Train On Using Ai Securely, Best Way
Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.
A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
New Insight on Operational Resiliency and Crises Management
Cyber Crime Junkies
04/21/23 • 59 min
New Insight on Operational Resiliency and Crises Management. Top security tips we all want to know.
VIDEO EPISODE HERE
Got Policies? Do you feel many organizations do not have the proper policies in place to protect their brand? It appears many we speak with tend to struggle to have all the necessary ones. Most have never conducted any exercise to test them and identify gaps.
We sat down with Lester Chng, CISSP, former Naval Officer who learned a great deal about WAR GAES in the military and sees the benefits to large enterprise and SMB clients to practice executing their policies before reality sets in. He shared his practices for addressing this. He has significant recommendations for addressing the four (4) main areas of security:
1. Cyber
2. Phys
3. Fraud
4. Crises management
Lester Chng has a very cool story he shared with us. It’s a story of immigration (from Singapore to Canada), one of military career transition into civilian life and breaking into the cybersecurity field and his story is built on a foundation of grit. He is passionate about crises management exercises and the practice since it always identifies holes and gaps in policies.
Come try Blushingintrovert.com. Portion of all sales go to Mental Health Awareness efforts.
Support the showWe Really would love it if you could SUBSCRIBE to our new Youtube Channel, PLEASE! http://www.youtube.com/@cybercrimejunkiespodcast
We welcome Apple Podcast 5-Star Reviews! https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
Explore More Podcast Content at https://cybercrimejunkies.com
Don't miss our Newsletter (no email needed!) VIGILANCE-Translating Cyber into Business. linkedin.com/newsletters/6941459114879311872
Shop our Small Business Sponsor, Blushing Introvert, Women comfort clothes, plushies with portion of all sales going to Mental Health Research. https://blushingintrovert.com
Want to try podcasting yourself? Use RIVERSIDE today! We use it (after trying every other platform and we LOVE it) Sign up here today! https://www.riverside.fm/?utm_campaign=campaign_5&utm_medium=affiliate&utm_source=rewardful&via=cybercrimejunkies
Human Story Behind Ransomware. Exclusive. Jon DiMaggio.
Cyber Crime Junkies
05/17/23 • 63 min
Jon DiMaggio of Analyst 1 shares exclusive insight into the human story behind ransomware from the blockbuster release of Ransomware Diaries Volume 2 discussing the people behind ransomware attacks
We Discuss:
💡the human story behind ransomware,
💡Getting To Know The People Behind Ransomware,
💡why its important to understand cyber crime motives,
💡how to understand cyber crime motives,
💡understanding cyber crime motives,
💡why its important to understand cyber crime mo,
💡what it means to profile a criminal,
💡exposing people who cause ransomware attacks,
💡profiling the people who cause ransomware attacks,
💡understanding the people who cause ransomware attacks,
💡the people who cause ransomware attacks,
💡getting to know the people behind ransomware attacks,
💡who causes ransomware attacks,
💡behind scenes cyber criminals,
💡behind the mask cyber crime gangs, cyber crime gang discussions,
💡cyber crime gang under cover, cyber crime gangs under cover,
💡examples of cyber crime gang activities, examples of recruiting in cyber crime gangs,
💡exposed secrets of cyber crime gangs,
💡exposing cyber crime gang activities,
Full Video Episode: https://youtu.be/9t23ovSL29A
Audio Podcast: Available Everywhere.
Thanks for Listening and Watching.
PLEASE CONSIDER SUBSCRIBING. It's FREE and it will help us to help others.
Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.
A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
12/24/22 • 63 min
A New Understanding of the Science of Social Engineering. Expert Chris Hadnagy. VIDEO EPISODE HERE.
A Must-watch/Listen episode! We discuss key topics of Social Engineering:
- · Non-verbal communication
- · Science of Brain Neuroscience
- · Manipulation versus Influence
- · Strategic Empathy
Chris Hadnagy is a professor at Univ of AZ, best-selling author and CEO of Social-Engineer, LLC and The Innocent Lives Foundation.
We discussed Chris’ first social engineering framework he created.
We review his best-selling books, and you can find out more here.
www.innocentlivesfoundation.org
Thanks for being a Cyber Crime Junky.
Thank you listening! Come Watch the Video episode!Please consider subscribing to our YouTube Channel for ALL Video episodes.
It's FREE. It helps us help others.
Our YouTube Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
UBER Crime Story 2. How Security Leaders Can be Liable.
Cyber Crime Junkies
03/12/24 • 61 min
This episode delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, discussing how Security Leaders can be liable.
This conversation discusses the Uber breach and the ongoing trial of Joseph Sullivan, the former chief security officer of Uber The conversation explores how the hacker gained access and the potential ways the breach could have been prevented. The trial of Joseph Sullivan is also discussed, with differing opinions on his actions and the verdict. The conversation highlights the impact of the breach and trial on the cybersecurity community.
Takeaways
- · The breach raises questions about the effectiveness of security measures and the need for regular penetration testing.
- · The ongoing trial of Joseph Sullivan, the former chief security officer of Uber, highlights the potential personal liability of cybersecurity leaders.
- · The breach and trial have had a significant impact on the cybersecurity community, leading to a reevaluation of roles and responsibilities.
Chapters PART 2
- 1:01 Trial of Joseph Sullivan
- 2:01 Uber's Awareness of the Breach
- 3:00 Hacker's Access and Screenshots
- 4:19 How the Hacker Gained Access
- 7:15 Understanding Hackers
- 13:40 Multifactor Authentication Fatigue
Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.
A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
How Parents Can Protect Children Online.
Cyber Crime Junkies
09/02/24 • 58 min
Titania Jordan. Best-selling author, CMO of Bark, and regular TV Guest on national TV shows, Titania Jordan, joins us to discuss Parenting in a Tech World.
We discuss:
- Common misconceptions and Parental Challenges today
- The Role and Responsibilities Social Media companies have and should have
- Best Practices and Practical Suggestion to manage the tech your children are using
- How to Monitor their online activity without invading their privacy
- Warnings signs to look for
- Markers indicating more significant behaviors.
Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.
A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
Latest Uber Trial and Arrest News. New Powerpoint Warning.
Cyber Crime Junkies
09/09/22 • 34 min
Latest Uber Trial and Arrest News. New Powerpoint Warning.
Blockbuster witness testimony exposed. Plus Breaking news on the Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes use of mouse movement in decoy Microsoft PowerPoint documents to deploy malware.
Check out our new Marketplace now available on CyberCrimeJunkies.com
Want EXCLUSIVE content? We now have have a special offer for those who want Exclusive Member-Only benefits! Subscribe here and sign up for Prime Access Today! (https://glow.fm/cybercrimejunkiesprime/) Get EXCLUSIVE Special Resources, Career Guidance, Cool Documentaries, Exclusive VIDEO Episodes, & Proprietary Security Trainings!
Interested in Trying BARK to protect your Family Online? Use Our Code to sign up and get a 7-day Free Trial and save 41%
Code: Sign up here Our Link https://www.bark.us/?ref=MXQHQBJ
or use our Cyber Crime Junkies PROMO CODE: MXQHQBJ
We use Bark to Protect our Families. Let us know how you enjoy it!
Show more best episodes
Show more best episodes
FAQ
How many episodes does Cyber Crime Junkies have?
Cyber Crime Junkies currently has 232 episodes available.
What topics does Cyber Crime Junkies cover?
The podcast is about News, Stories, Brand, Management, Leadership, Business News, Podcasts, Truecrime and Business.
What is the most popular episode on Cyber Crime Junkies?
The episode title 'What Employers Want in Security. Mike Miller.' is the most popular.
What is the average episode length on Cyber Crime Junkies?
The average episode length on Cyber Crime Junkies is 47 minutes.
How often are episodes of Cyber Crime Junkies released?
Episodes of Cyber Crime Junkies are typically released every 2 days, 9 hours.
When was the first episode of Cyber Crime Junkies?
The first episode of Cyber Crime Junkies was released on Jul 21, 2022.
Show more FAQ
Show more FAQ