
Cyber Crime Junkies
Cyber Crime Junkies. Host David Mauro.
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast


2 Listeners
All episodes
Best episodes
Seasons
Top 10 Cyber Crime Junkies Episodes
Goodpods has curated a list of the 10 best Cyber Crime Junkies episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Cyber Crime Junkies for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Cyber Crime Junkies episode by adding your comments to the episode page.

What Employers Want in Security. Mike Miller.
Cyber Crime Junkies
09/22/22 β’ 45 min
What Employers Want for Cybersecurity Careers. Expert Mike Miller.
BONUS VIDEO EPISODE HERE.
Join us as we learn some unique approaches to entering the cybersecurity field and leveraging key social media platforms with author and expert, vCISO Mike Miller. Mike has a great new book "Break Into Cyber" showing us how to break into the field. You can grab your copy here: https://www.breakincyber.com/
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!


2 Listeners

From Hacker to Hero: The Michael Calce Story β How 'Mafia Boy' Took Down The Internet
Cyber Crime Junkies
03/22/25 β’ 30 min
Summary
This episode explores the true cybercrime story of Michael Calce, also known as Mafia Boy, who was responsible for taking down major websites like Yahoo, E-Trade, eBay, and more during the dot com bubble. Michael's journey into hacking began when he received his first computer at the age of six and became fascinated with the idea of controlling and commanding it. He joined an elite Russian hacker group called TNT and used their resources to carry out his attacks. Despite covering his tracks, Michael was eventually caught due to his bragging in IRC chat rooms. He was sentenced to probation and has since become an ethical hacker, raising awareness about cybersecurity.
Chapters
- 00:00 Introduction: The Early Years of Michael Calce
- 06:39 Joining the TNT Hacker Group
- 18:29 The Takedown: Bringing Down Major Websites
- 23:26 The Arrest and Aftermath
- 28:10 The Changing Landscape of Hacking
- 29:05 Conclusion: From Cybercriminal to Ethical Hacker
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

1 Listener

The Biggest Breach In History. What You Need to Know.
Cyber Crime Junkies
10/06/22 β’ 41 min
Todayβs True Cyber Crime story is about a single click. A single distraction. The result was the largest data breach in the history of the internet. See how it happened, how espionage, foreign spies and questionable methods of communication plagued the company breached.
Also learn what specific steps we all need to take today considering this breach and others.
This is the true cyber crime story of YAHOO. See more episodes and cool stuff at CyberCrimeJunkies.com
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

1 Listener
1 Comment
1

12/24/22 β’ 63 min
A New Understanding of the Science of Social Engineering. Expert Chris Hadnagy. VIDEO EPISODE HERE.
A Must-watch/Listen episode! We discuss key topics of Social Engineering:
- Β· Non-verbal communication
- Β· Science of Brain Neuroscience
- Β· Manipulation versus Influence
- Β· Strategic Empathy
Chris Hadnagy is a professor at Univ of AZ, best-selling author and CEO of Social-Engineer, LLC and The Innocent Lives Foundation.
We discussed Chrisβ first social engineering framework he created.
We review his best-selling books, and you can find out more here.
www.innocentlivesfoundation.org
Thanks for being a Cyber Crime Junky.
Thank you listening! Come Watch the Video episode!Please consider subscribing to our YouTube Channel for ALL Video episodes.
It's FREE. It helps us help others.
Our YouTube Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg

Blood Culture. Elizabeth Holmes and The Fall of Theranos
Cyber Crime Junkies
08/11/22 β’ 35 min
This is the True Cyber Crime Story of Elizabeth Holmes and Theranos in this episode of Cyber Crime Junkies.
Our mission is to keep you, your family and your organization's brand safe. Nothing technical or boring. Through humor and real-life stories we make sense of Cybersecurity.
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

WE WORK. The Rise & Fall. A True Cyber Crime Story.
Cyber Crime Junkies
10/03/22 β’ 26 min
This is the True Cyber Crime Story of the Rise & Fall of WEWORK in this episode of Cyber Crime Junkies.
Poised as a cutting edge technology-based start-up, this brand was riddled with scandal and internal drama. Hear about the Rise and Fall of this real estate shared-space firm which, while recovering well today, had so many twists and turns along the way and a leader who drew drama into many of his dealings.
Our mission is to keep you, your family and your organization's brand safe. Nothing technical or boring. Through humor and real-life stories we make sense of Cybersecurity.
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Human Story Behind Ransomware. Exclusive. Jon DiMaggio.
Cyber Crime Junkies
05/17/23 β’ 61 min
Jon DiMaggio of Analyst 1 shares exclusive insight into the human story behind ransomware from the blockbuster release of Ransomware Diaries Volume 2 discussing the people behind ransomware attacks
We Discuss:
π‘the human story behind ransomware,
π‘Getting To Know The People Behind Ransomware,
π‘why its important to understand cyber crime motives,
π‘how to understand cyber crime motives,
π‘understanding cyber crime motives,
π‘why its important to understand cyber crime mo,
π‘what it means to profile a criminal,
π‘exposing people who cause ransomware attacks,
π‘profiling the people who cause ransomware attacks,
π‘understanding the people who cause ransomware attacks,
π‘the people who cause ransomware attacks,
π‘getting to know the people behind ransomware attacks,
π‘who causes ransomware attacks,
π‘behind scenes cyber criminals,
π‘behind the mask cyber crime gangs, cyber crime gang discussions,
π‘cyber crime gang under cover, cyber crime gangs under cover,
π‘examples of cyber crime gang activities, examples of recruiting in cyber crime gangs,
π‘exposed secrets of cyber crime gangs,
π‘exposing cyber crime gang activities,
Full Video Episode: https://youtu.be/9t23ovSL29A
Audio Podcast: Available Everywhere.
Thanks for Listening and Watching.
PLEASE CONSIDER SUBSCRIBING. It's FREE and it will help us to help others.
Our Video Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
Connect with us.
DAVID MAURO Linkedin: https://www.linkedin.com/in/daviddmauro/
Cyber Crime Junkies Linkedin: https://www.linkedin.com/in/cybercrimejunkies/
Cyber Crime Junkies Instagram:
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Elizabeth Holmes & Theranos. A True Cyber Crime Story.
Cyber Crime Junkies
11/17/22 β’ 37 min
This is the True Cyber Crime Story of Elizabeth Holmes and Theranos in this episode of Cyber Crime Junkies.
Our mission is to keep you, your family and your organization's brand safe. Nothing technical or boring. Through humor and real-life stories we make sense of Cybersecurity.
Hope you listen and hope you download all our episodes.
New episodes on Mondays (plus bonus episodes!)
Thanks for being a Cyber Crime Junky!
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

The Story Behind the Sony Data Breach 2014
Cyber Crime Junkies
04/14/24 β’ 48 min
This is the True Cyber Crime Story of βThe Day the Lights Went Out at Sony Picturesβ in 2014. Discussion about then events, what led to it, the formal findings and open questions remaining by experts. Hosts David Mauro and Mark Mosher explore their research with Special Guest, professional coach Rich Moore.
Summary
The conversation discusses the Sony Pictures cyberattack in 2014, exploring the various theories and implications of the breach. The hosts highlight the impact of the attack on Sony and the movie industry, as well as the broader implications for cybersecurity. They delve into the different theories surrounding the attack, including North Korea's involvement, insider activity, and stock manipulation. The conversation raises questions about the role of smaller organizations and the potential vulnerabilities they face. Overall, the discussion emphasizes the need for increased cybersecurity measures and awareness. The conversation explores different theories surrounding the Sony Pictures hack in 2014. The main theories discussed include: 1) North Korea as the sole perpetrator, 2) a disgruntled insider with connections to black hat hackers, 3) hacktivist groups like LulzSec and Anonymous, and 4) stock manipulation. The conversation highlights the inconsistencies and unanswered questions surrounding the official narrative that North Korea was solely responsible for the hack. The participants lean towards the theory that an insider with help from black hat hackers orchestrated the attack. They also discuss the possibility of stock manipulation and the involvement of hacktivist groups. The conversation concludes with the acknowledgment that there may be information that is not publicly available due to national security concerns.
Chapters
00:00 The Day the Lights Went Out at Sony Pictures
13:55 The Lights Get Turned Out: Implications and Theories
31:43 The Insider Threat: A Disgruntled Employee with Black Hat Connections
43:12 National Security and Unavailable Information
Our mission is to keep you, your family and your organi
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

Protecting your Identity and Brand. Expert Panel Discussion.
Cyber Crime Junkies
07/21/22 β’ 47 min
New Episode with Special Guess John McLaughlin.
Keeping your brand out of the news from a reputation-damaging data breach is top priority for sound leadership. Keeping criminal hackers out of your private information and stopping them from having unauthorized access to data they have no right to access, often depends on one critical factor: identifying who the person is. How an organization verifies (authenticates) users is the process by which security is kept and a brand is protected.
Gain insight on how to protect yourself and the organizationβs brand you serve.
Our mission is to keep you, your family and your organization's brand safe. Nothing technical or boring. Through humor and real-life stories we make sense of Cybersecurity.
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466
π§ Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
π Website: https://cybercrimejunkies.com
π± X/Twitter: https://x.com/CybercrimeJunky
πΈ Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
ποΈ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
ποΈ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
ποΈ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: π¬ Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
Show more best episodes

Show more best episodes
FAQ
How many episodes does Cyber Crime Junkies have?
Cyber Crime Junkies currently has 271 episodes available.
What topics does Cyber Crime Junkies cover?
The podcast is about Stories, Brand, Society & Culture, Management, Leadership, Podcasts, Truecrime and Business.
What is the most popular episode on Cyber Crime Junkies?
The episode title 'What Employers Want in Security. Mike Miller.' is the most popular.
What is the average episode length on Cyber Crime Junkies?
The average episode length on Cyber Crime Junkies is 45 minutes.
How often are episodes of Cyber Crime Junkies released?
Episodes of Cyber Crime Junkies are typically released every 2 days, 10 hours.
When was the first episode of Cyber Crime Junkies?
The first episode of Cyber Crime Junkies was released on Jul 21, 2022.
Show more FAQ

Show more FAQ