Cyber Crime Junkies
Cyber Crime Junkies. Host David Mauro.
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
2 Listeners
All episodes
Best episodes
Seasons
Top 10 Cyber Crime Junkies Episodes
Goodpods has curated a list of the 10 best Cyber Crime Junkies episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Cyber Crime Junkies for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Cyber Crime Junkies episode by adding your comments to the episode page.
What Employers Want in Security. Mike Miller.
Cyber Crime Junkies
09/22/22 • 45 min
What Employers Want for Cybersecurity Careers. Expert Mike Miller.
BONUS VIDEO EPISODE HERE.
Join us as we learn some unique approaches to entering the cybersecurity field and leveraging key social media platforms with author and expert, vCISO Mike Miller. Mike has a great new book "Break Into Cyber" showing us how to break into the field. You can grab your copy here: https://www.breakincyber.com/
Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
2 Listeners
From Hacker to Hero: The Michael Calce Story – How 'Mafia Boy' Took Down The Internet
Cyber Crime Junkies
07/15/24 • 30 min
Summary
This episode explores the true cybercrime story of Michael Calce, also known as Mafia Boy, who was responsible for taking down major websites like Yahoo, E-Trade, eBay, and more during the dot com bubble. Michael's journey into hacking began when he received his first computer at the age of six and became fascinated with the idea of controlling and commanding it. He joined an elite Russian hacker group called TNT and used their resources to carry out his attacks. Despite covering his tracks, Michael was eventually caught due to his bragging in IRC chat rooms. He was sentenced to probation and has since become an ethical hacker, raising awareness about cybersecurity.
Chapters
- 00:00 Introduction: The Early Years of Michael Calce
- 06:39 Joining the TNT Hacker Group
- 18:29 The Takedown: Bringing Down Major Websites
- 23:26 The Arrest and Aftermath
- 28:10 The Changing Landscape of Hacking
- 29:05 Conclusion: From Cybercriminal to Ethical Hacker
Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
1 Listener
The Biggest Breach In History. What You Need to Know.
Cyber Crime Junkies
10/06/22 • 41 min
Today’s True Cyber Crime story is about a single click. A single distraction. The result was the largest data breach in the history of the internet. See how it happened, how espionage, foreign spies and questionable methods of communication plagued the company breached.
Also learn what specific steps we all need to take today considering this breach and others.
This is the true cyber crime story of YAHOO. See more episodes and cool stuff at CyberCrimeJunkies.com
Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
1 Listener
1 Comment
1
Uber Breach and Trial. What You Need to Know.
Cyber Crime Junkies
09/19/22 • 60 min
Uber's Latest Breach & Trial of Former Security Head. What You Need to Know.
Breaking news discussion on Trial of the century involving the historic charges against internal CISO Joe Sullivan and the new UBER data breach, how it happened and what it means.
Try KiteWorks today at www.KiteWorks.com
Don't Miss our Video on this Exciting KiteWorks Offer!
Try KiteWorks today at www.KiteWorks.com
Don't miss this Video on it!
The Most Secure Managed File Transfer System.
Get Aura today! Complete Online Safety from friends at Cyber Threat Group.
- Watch Video Episodes! And Please...Subscribe to our YouTube Channel.
- Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
- Submit Your Questions Direct and Find out more www.CyberCrimeJunkies.com
- Stay up-to-date on Cybersecurity with VIGILANCE Newsletter.
- Want Gear? We love our Small Business Sponsor, BlushingIntrovert.com. has it all. Women’s clothing, cool accessories supporting Mental Health Research. https://blushingintrovert.com
Hunting Down Hackers. John Hammond Exclusive.
Cyber Crime Junkies
12/26/24 • 61 min
Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond.
Video episode here: https://youtu.be/CMOu0o9FvFQ
Examples with advice from top security content creator JOHN HAMMOND. Understanding the Cyber Crime Mind To Protect Business, top security content creator insight, recent true cyber crime examples, new findings on cyber crime gangs including EXCLUSIVE DISCUSSION ON BLACK CAT RANSOMWARE GANG and Anatomy of a Social Engineering attack.
Topics: understanding cyber crime mind, new insight on true cyber crime examples, new insight on cyber crime gangs, best ways to keep up to date on security news, best ways to limit cyber attack liability, best ways to protect business from cyber crime, and brand protection with identification authentication.
John has a huge following: 2 Million Youtube subscribers, 570k+ Twitter followers and 250k+ Linkedin Followers!
Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
Human Story Behind Ransomware. Exclusive. Jon DiMaggio.
Cyber Crime Junkies
05/17/23 • 61 min
Jon DiMaggio of Analyst 1 shares exclusive insight into the human story behind ransomware from the blockbuster release of Ransomware Diaries Volume 2 discussing the people behind ransomware attacks
We Discuss:
💡the human story behind ransomware,
💡Getting To Know The People Behind Ransomware,
💡why its important to understand cyber crime motives,
💡how to understand cyber crime motives,
💡understanding cyber crime motives,
💡why its important to understand cyber crime mo,
💡what it means to profile a criminal,
💡exposing people who cause ransomware attacks,
💡profiling the people who cause ransomware attacks,
💡understanding the people who cause ransomware attacks,
💡the people who cause ransomware attacks,
💡getting to know the people behind ransomware attacks,
💡who causes ransomware attacks,
💡behind scenes cyber criminals,
💡behind the mask cyber crime gangs, cyber crime gang discussions,
💡cyber crime gang under cover, cyber crime gangs under cover,
💡examples of cyber crime gang activities, examples of recruiting in cyber crime gangs,
💡exposed secrets of cyber crime gangs,
💡exposing cyber crime gang activities,
Full Video Episode: https://youtu.be/9t23ovSL29A
Audio Podcast: Available Everywhere.
Thanks for Listening and Watching.
PLEASE CONSIDER SUBSCRIBING. It's FREE and it will help us to help others.
Our Video Channel @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg
Connect with us.
DAVID MAURO Linkedin: https://www.linkedin.com/in/daviddmauro/
Cyber Crime Junkies Linkedin: https://www.linkedin.com/in/cybercrimejunkies/
Cyber Crime Junkies Instagram:
Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
New Insight on Operational Resiliency and Crises Management
Cyber Crime Junkies
04/21/23 • 59 min
New Insight on Operational Resiliency and Crises Management. Top security tips we all want to know.
VIDEO EPISODE HERE
Got Policies? Do you feel many organizations do not have the proper policies in place to protect their brand? It appears many we speak with tend to struggle to have all the necessary ones. Most have never conducted any exercise to test them and identify gaps.
We sat down with Lester Chng, CISSP, former Naval Officer who learned a great deal about WAR GAES in the military and sees the benefits to large enterprise and SMB clients to practice executing their policies before reality sets in. He shared his practices for addressing this. He has significant recommendations for addressing the four (4) main areas of security:
1. Cyber
2. Phys
3. Fraud
4. Crises management
Lester Chng has a very cool story he shared with us. It’s a story of immigration (from Singapore to Canada), one of military career transition into civilian life and breaking into the cybersecurity field and his story is built on a foundation of grit. He is passionate about crises management exercises and the practice since it always identifies holes and gaps in policies.
Come try Blushingintrovert.com. Portion of all sales go to Mental Health Awareness efforts.
Support the showWe Really would love it if you could SUBSCRIBE to our new Youtube Channel, PLEASE! http://www.youtube.com/@cybercrimejunkiespodcast
We welcome Apple Podcast 5-Star Reviews! https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
Explore More Podcast Content at https://cybercrimejunkies.com
Don't miss our Newsletter (no email needed!) VIGILANCE-Translating Cyber into Business. linkedin.com/newsletters/6941459114879311872
Shop our Small Business Sponsor, Blushing Introvert, Women comfort clothes, plushies with portion of all sales going to Mental Health Research. https://blushingintrovert.com
Want to try podcasting yourself? Use RIVERSIDE today! We use it (after trying every other platform and we LOVE it) Sign up here today! https://www.riverside.fm/?utm_campaign=campaign_5&utm_medium=affiliate&utm_source=rewardful&via=cybercrimejunkies
UBER Crime Story 2. How Security Leaders Can be Liable.
Cyber Crime Junkies
03/12/24 • 58 min
This episode delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, discussing how Security Leaders can be liable.
This conversation discusses the Uber breach and the ongoing trial of Joseph Sullivan, the former chief security officer of Uber The conversation explores how the hacker gained access and the potential ways the breach could have been prevented. The trial of Joseph Sullivan is also discussed, with differing opinions on his actions and the verdict. The conversation highlights the impact of the breach and trial on the cybersecurity community.
Takeaways
- · The breach raises questions about the effectiveness of security measures and the need for regular penetration testing.
- · The ongoing trial of Joseph Sullivan, the former chief security officer of Uber, highlights the potential personal liability of cybersecurity leaders.
- · The breach and trial have had a significant impact on the cybersecurity community, leading to a reevaluation of roles and responsibilities.
Chapters PART 2
- 1:01 Trial of Joseph Sullivan
- 2:01 Uber's Awareness of the Breach
- 3:00 Hacker's Access and Screenshots
- 4:19 How the Hacker Gained Access
- 7:15 Understanding Hackers
- 13:40 Multifactor Authentication Fatigue
- 15:34 Moving Laterally and Pivoting
- 17:26 Access to Uber's Systems
- 18:23 Access to Cloud Services
- 23:20 Bug Bounty Program
- 25:14 Hacker's Boastful Behavior
- 26:12 Prevention and Penetration Testing
- 29:02 Ongoing Trial of Joseph Sullivan
- 30:28 Previous Breach and Payment to Hackers
- 33:23 Charges Against Joseph Sullivan
- 35:18 Testimony of Uber CEO
- 36:46 Testimony of Former In-House Counsel
- 39:41 Turning the Breach into a Bug Bounty
- 43:08 Defense
Grow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
12/27/22 • 2 min
Dont miss the Chris Hadnagy episode now live.! Here's why! A New Understanding of the Science of Social Engineering. Expert Chris Hadnagy.
Protect Your Children without invading their privacy and get alerted when they are at risk of cyber-bullying, suicidal ideation, online predators or need assistance for their safety. We use it to protect our own families.
Sign up and Protect your family with Bark using our affiliate Link Here.
New Exclusive Content at CCJ PRIME.
For less than 1 cup of coffee a month you can have it all.
Exclusive videos, in-depth interviews, Premium Resources for Skills training and Brand Building and Brand Protection. CLICK HERE TO SUBSCRIBE to PRIME. https://glow.fm/cybercrimejunkiesprime/.
Latest Uber Trial and Arrest News. New Powerpoint Warning.
Cyber Crime Junkies
09/09/22 • 34 min
Latest Uber Trial and Arrest News. New Powerpoint Warning.
Blockbuster witness testimony exposed. Plus Breaking news on the Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes use of mouse movement in decoy Microsoft PowerPoint documents to deploy malware.
Check out our new Marketplace now available on CyberCrimeJunkies.com
Want EXCLUSIVE content? We now have have a special offer for those who want Exclusive Member-Only benefits! Subscribe here and sign up for Prime Access Today! (https://glow.fm/cybercrimejunkiesprime/) Get EXCLUSIVE Special Resources, Career Guidance, Cool Documentaries, Exclusive VIDEO Episodes, & Proprietary Security Trainings!
Interested in Trying BARK to protect your Family Online? Use Our Code to sign up and get a 7-day Free Trial and save 41%
Code: Sign up here Our Link https://www.bark.us/?ref=MXQHQBJ
or use our Cyber Crime Junkies PROMO CODE: MXQHQBJ
We use Bark to Protect our Families. Let us know how you enjoy it!
Show more best episodes
Show more best episodes
FAQ
How many episodes does Cyber Crime Junkies have?
Cyber Crime Junkies currently has 245 episodes available.
What topics does Cyber Crime Junkies cover?
The podcast is about News, Stories, Brand, Management, Leadership, Business News, Podcasts, Truecrime and Business.
What is the most popular episode on Cyber Crime Junkies?
The episode title 'What Employers Want in Security. Mike Miller.' is the most popular.
What is the average episode length on Cyber Crime Junkies?
The average episode length on Cyber Crime Junkies is 45 minutes.
How often are episodes of Cyber Crime Junkies released?
Episodes of Cyber Crime Junkies are typically released every 2 days, 9 hours.
When was the first episode of Cyber Crime Junkies?
The first episode of Cyber Crime Junkies was released on Jul 21, 2022.
Show more FAQ
Show more FAQ