Cyber Crime відкриті
[search 0]
більше

Download the App!

show episodes
 
C
Cyber Crime Junkies

1
Cyber Crime Junkies

Cyber Crime Junkies by David Mauro

Unsubscribe
Unsubscribe
Щотижня+
 
True Cyber Crime Stories. Interviews with Leaders who Built and Protect Great Brands. Become a Cyber Crime Junky! Humorous trivia coupled with Industry News & Trends. Brand Growth and Brand Protection discussions. From experienced podcast hosts, David Mauro and Mark Mosher.
 
Mind the Tech ist ein Podcast, der die dunklen Seiten der IT- und Tech-Welt beleuchtet. Dazu zählen legendäre Hackerangriffe, Datendiebstähle und Cyberattacken. Ebenso kommen die unzähligen Geschichten von Menschen auf den Tisch, die es mit Recht und Gesetz im Web nicht so ernst nehmen – und irgendwann die Konsequenzen ihres Handelns zu spüren bekommen. Wir widmen uns Antitrends und Mythen, stellen Entwicklungen im und rund ums Internet in Frage, wägen ab. Denn wir sind fest davon überzeugt: ...
 
Loading …
show series
 
Avoid Million-Dollar Mistakes! Brand Protection in light of New Changes in Cyber Insurance We All Need to know. Special Guest, Expert and Best-Selling author Joseph Brunsman, joins hosts David Mauro and Mark Mosher in the Cyber Crime Junkies Studio to discuss new changes, blockbuster cases and ways to protect your brand. We discuss What is and is n…
 
Quantum computing poses a threat to encryption, with the power to crack any one of our current "safe" algorithms in no time. So NIST had a contest to find a new safe standard. This is how a strong contender fell from grace. Sources: https://pastebin.com/gc3GpxdLChloe Thonus
 
This is the True Cyber Crime Story of Elizabeth Holmes and Theranos in this episode of Cyber Crime Junkies. We explore why cybercrime grows daily, how it is funded, productized and organized, how to protect yourself from cybercrime, and where cybercrime goes to hide. Find out the shocking facts involved in this true cybercrime, how this happened, t…
 
This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency Ponzi scheme in history. Three main players, Ruja Ignatova (The Crypto Queen), her brother Konstantin and Sebastian Greenwood (the public face of ONECO…
 
This is the True Cyber Crime Story of the Rise & Fall of WEWORK in this episode of Cyber Crime Junkies. Poised as a cutting edge technology-based start-up, this brand was riddled with scandal and internal drama. Hear about the Rise and Fall of this real estate shared-space firm which, while recovering well today, had so many twists and turns along …
 
PrestaShop is a great open source tool for e-commerce sites, and is behind the websites of many shop owners. However an SQL injection that leads to remote code execution allows threats the ability to modify shops for the worse. Sources: https://pastebin.com/HTV5b6TSChloe Thonus
 
This is the True Cyber Crime Story of UBER in this episode of Cyber Crime Junkies. Learn about the Rise & Fall of this iconic Brand that changed the world across the globe. Plagued with scandal and Drama where their former IT Security leader faces federal indictment and potentially prison for what is alleged to be a cover up involving a massive dat…
 
New Episode with Special Guess John McLaughlin. Keeping your brand out of the news from a reputation-damaging data breach is top priority for sound leadership. Keeping criminal hackers out of your private information and stopping them from having unauthorized access to data they have no right to access, often depends on one critical factor: identif…
 
Most ransomware encrypts your entire device and leaves a ransom note for you to pay up. But this new ransomware is sneakier and allows hackers more control and gives you more room for error. Sources: https://pastebin.com/QX8D1gEaChloe Thonus
 
This is the True Cyber Crime Story of Elizabeth Holmes and Theranos in this episode of Cyber Crime Junkies. We explore why cybercrime grows daily, how it is funded, productized and organized, how to protect yourself from cybercrime, and where cybercrime goes to hide. Find out the shocking facts involved in this true cybercrime, how this happened, t…
 
A DDoS is usually performed with malware infected computers called zombies, but as smart devices and the Internet of Things rises in popularity, a new insecure tech can be exploited to perform these attacks that can't be predicted or prepared for. Sources: https://pastebin.com/9qbkAVHyChloe Thonus
 
This is the True Cyber Crime Story of “The Day the Lights Went Out at Sony Pictures” in 2014. Discussion about then events, what led to it, the formal findings and open questions remaining by experts. Hosts David Mauro and Mark Mosher explore their research with Special Guest, professional coach Rich Moore. We explore why cybercrime grows daily, ho…
 
Usually corporations are targets of cybercrime, but this new malware was made for home routers and allows whoever controls it remote access to your network. Is it espionage? Data harvesting? A new way to target corporations through their tech illiterate users? Sources: https://pastebin.com/tFDgP0ENChloe Thonus
 
Was Cybercrime as a Service so erfolgreich macht +++++++ Links +++++++ 👉 Aufreger der Woche - geplant: 18 people spent a week working in the metaverse. 2 dropped out and the rest felt frustrated and said their eyes hurt, study finds. (2022) 18 Freiwillige arbeiteten eine Woche lang im Metaversum und nutzten die virtuelle Realität.Zwei von ihnen bra…
 
I wanted to figure out what the biggest hack ever was, and I think I may have found it! No official dollar amount is assigned to this attack that targeted a tycoon in the oil industry, but it is among the most expensive. Sources: https://pastebin.com/X2JfTv21Chloe Thonus
 
Portrait eines rastlosen Geistes +++++++ Links +++++++ 👉 Aufreger der Woche: 100 Personen gerettet: Alpenverein warnt vor ungeprüften Wander-Infos im Netz (2020) Wie Lehrer einer jetzt in Österreich geretteten deutschen Schulgruppe entnehmen Wanderer gerne Tipps aus dem Internet für Touren. Das kann gefährlich sein. https://www.heise.de/news/100-Pe…
 
Zwischen Burnout und Bällebad +++++++ Links +++++++ 👉 The Morpheus Tutorials: Passwort Manager - Warum ihr einen nutzen solltet und welchen ich nutze (2021) https://www.youtube.com/watch?v=1ct0j5AuvRU 👉 bitkom: IT-Fachkräftelücke wird größer: 96.000 offene Jobs (2022) https://www.bitkom.org/Presse/Presseinformation/IT-Fachkraefteluecke-wird-groesse…
 
The Silk Road is one of the most notorious websites on the deep web that sold mostly drugs but some other illegal materials as well. On this Extra Special Episode of Bite Sized Cyber Crime I explore the man behind the site and how it was shut down. Sources: https://pastebin.com/US6nesaXChloe Thonus
 
The historic Lincoln college was a college in Lincoln, IL that was one of the few predominantly black rural schools. Here is how a combination of a pandemic and a ransomware attack would close the school permanently. Sources: https://pastebin.com/UYLi7tauChloe Thonus
 
Windows 11 has been out for a bit of time now, and some users have been questioning why such a new CPU is required to upgrade, especially considering flexibility in previous system requirements. Well, turns out there is a security reason Microsoft cites. Sources: https://pastebin.com/4iybK0csChloe Thonus
 
In a world after Metallica v. Napster, music producers would go to any lengths to protect their music from piracy. Some went a little too far in protecting their intellectual property, however.... Sources: https://pastebin.com/9dnKCP8qChloe Thonus
 
In the world of crypto, a heist can mean bankruptcy with no one to bail you out. However in one of the largest crypto heists ever, the hacker didn't intend on keeping any of the money. Sources: https://pastebin.com/3SqhEfGVChloe Thonus
 
Zwischen digitaler Lust und analogem Frust +++++++ Links +++++++ 👉 So ist es, ein Date mit einem Sex-Roboter zu haben (2019) https://www.gq-magazin.de/leben-als-mann/beziehung/realrobotix-date-sexroboter-harmony 👉 How Robots Work (2022) https://science.howstuffworks.com/robot.htm 👉 Youtube: Ameca Humanoid Robot AI Platform (2022) https://www.youtub…
 
Last year the Poly Network crypto heist was thought to be the biggest and baddest, but this year a new contender steps up when a play-to-earn game had $620 million USD in crypto stolen. Sources: https://pastebin.com/ANgjanj5Chloe Thonus
 
Im Gespräch mit Tech-YouTuber Cedric +++++++ Links +++++++ 👉 The Morpheus Tutorials - Komplizierte Informatik leicht erklärt https://the-morpheus.de/ 👉 The Morpheus auf Twitter https://twitter.com/TheMorpheusTuts 👉 The Morpheus Vlogs https://www.youtube.com/c/TheMorpheusVLogs +++++++ Mind The Tech im Netz +++++++ Instagram: @mindthetech.podcast Twi…
 
The military conflict in Ukraine has involved cyberwarfare, and although today I will not be covering any direct conflict information I will discuss a botnet uncovered and dismantled by the FBI, though tot be controlled by Russian hacking group Sandworm. Sources: https://pastebin.com/GVpst2i9Chloe Thonus
 
Log4Shell was one of the worst exploits discovered, giving hackers the ability to remotely execute code and being built into a large amount of software used regularly. So what was the impact? Today we find out. Sources: https://pastebin.com/PKgWHN9ZChloe Thonus
 
Wie die Kampfzone Internet entstand +++++++ Links +++++++ 👉 Es sind nicht immer nur böse Russen... Interview mit Manuel Atug (2022) https://www.zeit.de/digital/2022-03/kritische-infrastruktur-hackerangriff-it-sicherheit-manuel-atug-interview 👉 Vor 60 Jahren begann das Zeitalter der Raumfahrt - Sputnik: Warum sein Start vor 60 Jahren ein Schock war …
 
LAPSUS$ has been making waves as the bold, chaotic new hacking group on the rise. Most recently they hit Okta, a corporation that provides security solutions for other corporations. Here's everything we know so far, recorded the day before release (3/28/2022). Updates sure to come! Sources: https://pastebin.com/u8fQ0FqL…
 
Lehren aus dem Ukraine-Konflikt +++++++ Hacking +++++++ 👉 Tausende Freiwillige ziehen in den Cyberkrieg (2022) https://www.spiegel.de/netzwelt/web/ukraine-tausende-freiwillige-ziehen-in-den-cyberkrieg-a-5c115cc3-0bb9-48ee-bbce-7802cc8fb522 👉 Ukraine stellt internationale IT-Armee mit Tausenden Cybersecurity-Experten zusammen (2022) https://t3n.de/n…
 
In 2011 the Playstation network was knocked offline for a month to the dismay of gamers and the smug excitement of Xbox users. What took down such a gaming industry giant? Here's how a group of trolls leaked the personal information of millions of Sony Playstation users. Sources: https://pastebin.com/Qe5a7WPP…
 
NVIDIA, the tech giant in GPUs, was hacked by a group called Lapsus$. Lapsus$ claims NVIDIA hit them back, trying to prevent the release of data to avoid paying a ransom in crypto. What was stolen? Did NVIDIA strike back? Find out in this episode of Bite Sized Cyber Crime. EDIT: After the initial release of this episode new broke out the same day r…
 
Wenn der Mensch zur Schnittstelle wird +++++++ Links +++++++ 👉 rC3 Cyberpunk 2022 - wo Brain-Computer-Interfaces auf Grundrechte treffen von Carolin Kemper und Michael Kolain (2021) https://media.ccc.de/v/rc3-2021-haecksen-369-cyberpunk-2022-wo 👉 @CarolinKemper auf Twitter https://twitter.com/CarolinKemper 👉 Deutschlandfunk Kultur: Technische Gefah…
 
A safe store to download apps is a great way to improve security, but not when malware is allowed to slip through the cracks. Last month Microsoft began cracking down on malware infested games in the Microsoft Store, here's what you need to know.Chloe Thonus
 
Schöne neue VR-Welt auf dem Prüfstand +++++++ Spiel Tipp +++++++ 👉 Crimeland - Euer Krimispiel für Zuhause https://www.crime.land/ +++++++ Links +++++++ 👉 Metaverse Keynote: The Metaverse and How We'll Build It Together -- Connect 2021 (2021) https://www.youtube.com/watch?v=Uvufun6xer8 👉 State of play - 10 Visions Of The Metaverse From Science Fict…
 
YK2 petrified the world in 2000, as software engineers worked tirelessly to ensure the world would run smoothly in the transition into the new millennium and it is back with a vengeance! Sort of. A strange bug in some software used by Microsoft, Honda, and Acura caused a few issues New Year's Day. Sources: https://pastebin.com/D2DQZxdg…
 
I briefly discuss a short lived app marketed with the intention of security that was actually a piece of malware that stole user data and sent it right back to the very hackers you may be trying to protect yourself from. Sources https://pastebin.com/M0Yi8Xv9Chloe Thonus
 
Wenn der Online-Flirt wortlos endet +++++++ Nominierung +++++++ 👉 Offenes Voting zum Digital Autonomy Award https://digitalautonomy.net/award/voting +++++++ Streaming-Tipp +++++++ 👉 Hungern mit Instagram: Wie triggert Insta Essstörungen? | STRG_F (2022) https://www.funk.net/channel/strgf-11384/hungern-mit-instagram-wie-triggert-insta-essstoerungen-…
 
Ein ungefilterter Blick hinter die Kulissen +++++++ Links +++++++ 👉 Der Fall Gabby Petito: A timeline of 22-year-old Gabby Petitos case (2021) https://edition.cnn.com/2021/09/16/us/gabby-petito-timeline-missing-case/index.html 👉 Gabler Wirtschaftslexikon (2018) https://wirtschaftslexikon.gabler.de/definition/influencer-100360 👉 Definition Influence…
 
Im Gespräch mit Carsten Meywirth Vorschau Textbaustein +++++++ Links +++++++ 👉 Website der Fachabteilung Cybercrime / BKA Wiesbaden (2021) https://www.bka.de/DE/DasBKA/OrganisationAufbau/Fachabteilungen/Cybercrime/cybercrime_node.html 👉 Ausbildung zum/zur Cyber-Kriminalist*in (2021) https://www.bka.de/DE/KarriereBeruf/EinstiegBeimBKA/Studenten/Nach…
 
Der Fall Scoolio +++++++ Weiterführende Links +++++++ 👉 Scoolio - die Schüler App (2021) https://www.scoolio.de/ 👉 Scoolio - Stellungnahme (2021) https://www.scoolio.de/Content/docs/27102021_FAQ_Scoolio%20Zerforschung.pdf 👉 DLF Bericht zum Scoolio Datenleck (2021) https://www.deutschlandfunkkultur.de/schul-app-scoolio-staatlich-finanziertes-datenle…
 
Loading …

Короткий довідник

Google login Twitter login Classic login