Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
History
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/de/22/09/de220900-98b3-8d7d-8435-7badada44770/mza_17671125844663600994.jpg/600x600bb.jpg
Cyber Crime Junkies
Cyber Crime Junkies. Host David Mauro.
294 episodes
1 day ago
Question? Text our Studio direct. Fraud Expert Ayelet Biger joins us. Find her at her site: https://scamranger.ai/ Chapters 00:00 Introduction and Overview02:49 Shining a Light on the Victim's Perspective10:00 Creating a Seamless User Experience12:23 The Role of Behavioral Biometrics in Fraud Detection15:16 Distinguishing Between Legitimate Users and Cyber Criminals20:06 The Ecosystem of Credit Card Fraud and Identity Theft26:15 Bank Liability and Fraud28:09 Common Scams36:03 Pig Butc...
Show more...
Technology
Business,
News
RSS
All content for Cyber Crime Junkies is the property of Cyber Crime Junkies. Host David Mauro. and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Question? Text our Studio direct. Fraud Expert Ayelet Biger joins us. Find her at her site: https://scamranger.ai/ Chapters 00:00 Introduction and Overview02:49 Shining a Light on the Victim's Perspective10:00 Creating a Seamless User Experience12:23 The Role of Behavioral Biometrics in Fraud Detection15:16 Distinguishing Between Legitimate Users and Cyber Criminals20:06 The Ecosystem of Credit Card Fraud and Identity Theft26:15 Bank Liability and Fraud28:09 Common Scams36:03 Pig Butc...
Show more...
Technology
Business,
News
Episodes (20/294)
Cyber Crime Junkies
Ransomware Negotiations EXPOSED: Inside Cyber Hostage Deals with Kurtis Minder
Question? Text our Studio direct. Kurtis Minder, seasoned ransomware negotiator, shares insights into the complex world of cybercrime negotiations. He discusses the psychological aspects of negotiating with cybercriminals, the role of AI in both offense and defense, and the importance of understanding the motivations behind cybercrime. The conversation also touches on the evolving landscape of ransomware as a service and the implications for businesses and national security. Season 8 is offic...
Show more...
1 day ago
1 hour 2 minutes

Cyber Crime Junkies
After the Blast: How One CEO Fought Back 💥 | A True Crime
Question? Text our Studio direct. Robert Cioffi, CEO of a small company discusses the highly emotional impact that a major ransomware attack had on his, his customers and the community.The Emotional Toll of Cyber Attack was horrific to witness and made national news. Learn how to get prepared in this True Cyber Crime Story. Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done with full cyber chaos: 🔥 Interviews with spies &...
Show more...
2 days ago
1 hour 21 minutes

Cyber Crime Junkies
Ransomware Is NOT the Greatest Threat | Here Is What's Coming
Question? Text our Studio direct. New Episode🔥The Cybercrime Junkies show discusses the evolution of ransomware, highlighting how it has shifted from simple file locking to direct extortion. We explore the latest ransomware trends and the significant ransomware impact on critical sectors like hospitals and supply chains. This ransomware attack strategy now directly targets customers and patients, demonstrating how ransomware works to affect executives and businesses alike. Stay informed about...
Show more...
3 days ago
49 minutes

Cyber Crime Junkies
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
Question? Text our Studio direct. Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses identity verification challenges. We discuss how to reduce risk from multi factor authentication, explore mobile-b...
Show more...
4 days ago
52 minutes

Cyber Crime Junkies
How to Measure Cyber Risk Today: Guidelines for Leaders
Question? Text our Studio direct. What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to Know Ryan Leirvik who joins us in the studio. Ryan is the CEO of Neuvik & author of Understand, Manage, and Measure Cyber Risk®,Practical Solutions for Creating a Ryan has decades of experienc...
Show more...
5 days ago
1 hour 4 minutes

Cyber Crime Junkies
Famous Hacker Reveals TRUE Ethical Hacking Stories
Question? Text our Studio direct. 🚨New Episode 🚨We’re joined in-studio by Bryan Seely— World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ. He’s also the author of Cyber Fraud: The Web of Lies! We discuss: true ethical hacking stories, data brokers and privacy risks, wiretapping, Google Maps, data brokers and privacy concerns, how data brokers operate without regulation, and How Hack...
Show more...
6 days ago
50 minutes

Cyber Crime Junkies
CHAOS | Cybersecurity Predictions You Need to Know NOW
Question? Text our Studio direct. New Episode🔥CHAOS | Cybersecurity Predictions You Need to Know NOW. Cybercrime Junkies show dives into the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and seasoned pros alike. Learn about the latest threats, including ransomware and malware, and the minds of the hackers behind them. Stay informed and protect yourself from cyber crime. Chapters 00:00 Holiday Predictions and Trivia Fun 02:29 The Impact of Tec...
Show more...
1 week ago
36 minutes

Cyber Crime Junkies
Insider Threats | When the Hacker Already Has a Badge
Question? Text our Studio direct. 🔥The Cybercrime Junkies show debunks the myth of the typical cyber villain, focusing on how everyday situations can lead to significant `cyber security` breaches. We discuss real-world `cybercrime` scenarios involving `insider` threats and the critical need for `insider threat detection`. Understanding these risks is key to effective `risk management` in today's digital landscape. New Episode🔥Insider Threats | When Employees Become the BIGGEST Attacker...
Show more...
1 week ago
20 minutes

Cyber Crime Junkies
The MOST INSANE Things That's Happened in Cyber Space This Month!
Question? Text our Studio direct. New Episode🔥🔥The Cybercrime Junkies show discusses contemporary `cyber security` challenges, emphasizing that older notions of threats are outdated. We dive into how direct `hacking` via `wifi` can lead to gaining `root` access, and how quick action is needed to mitigate these `exploit`s. Stay informed to protect your systems from `cyber crime` and ensure proper `shell` access management. ========================================================== 00:00 Cold...
Show more...
1 week ago
25 minutes

Cyber Crime Junkies
Ransomware Real Life Stories Effect On People. PART 2
Question? Text our Studio direct. Robert Cioffi, CEO of a leading NY MSP and discusses ransomware real life stories effect on people, ransomware shocking toll on people from a real life victim perspective, and the ransomware impact on real life small business. We discuss ransomware what it feels like to be a victim and the ransomware impact on real life individuals. A compelling emotional story of how his company was attacked by REVIL in the infamous KASEYA breach, his depicted of what it fee...
Show more...
1 week ago
48 minutes

Cyber Crime Junkies
Ransomware Real Life Stories Effect On People. PART 1
Question? Text our Studio direct. Robert Cioffi, CEO of a leading NY MSP and discusses ransomware real life stories effect on people, ransomware shocking toll on people from a real life victim perspective, and the ransomware impact on real life small business. We discuss ransomware what it feels like to be a victim and the ransomware impact on real life individuals. A compelling emotional story of how his company was attacked by REVIL in the infamous KASEYA breach, his depicted of what it fee...
Show more...
1 week ago
36 minutes

Cyber Crime Junkies
FBI Most Wanted. Ruja Ignatova. Story of OneCoin.
Question? Text our Studio direct. This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency Ponzi scheme in history. Three main players, Ruja Ignatova (The Crypto Queen), her brother Konstantin and Sebastian Greenwood (the public face of ONECOIN and ONELIFE) wreaked havoc on the world amassing over $4 Billion dollars for a crypto currency that never even...
Show more...
2 weeks ago
34 minutes

Cyber Crime Junkies
AI Hackers Are Now COMPLETELY UNSTOPPABLE
Question? Text our Studio direct. Today we’re talking about AI-powered cybercrime—a phrase that sounds like a marketing stunt but is, unfortunately, very real. Cybercriminals basically got a software update, and now they’re running their operations with more automation, more scale, and — let’s just say it — better customer service than half the vendors in your tech stack. Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done wi...
Show more...
3 weeks ago
17 minutes

Cyber Crime Junkies
TV Wars and Espionage.
Question? Text our Studio direct. From Rupert Murdoch's global entertainment ambition to a dead hacker found hanging from a tree in a park in Germany, this true cyber crime story spans over a decade in the cut-throat Satellite TV wars, involving colorful characters, pirates, big business, technology advances and failures and those who entered the darker side to try and get what they wanted. This is the true cyber crime story of TV Wars and Espionage. Pirates, a Dead Hacker. A Shocking C...
Show more...
3 weeks ago
43 minutes

Cyber Crime Junkies
Safeguarding Your Privacy: How to Delete Your Data
Question? Text our Studio direct. David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ, about how data brokers work and how to delete your data by discussing the intersection of privacy and personal data. They discuss the role of data brokers, the lack of transparency in data collection, and the potential risks of AI and deepfake technology. Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational ...
Show more...
3 weeks ago
1 hour

Cyber Crime Junkies
The Undetected. Espionage and Spies.(Part 2)
Question? Text our Studio direct. Inside Espionage What Every American Should Know. Inside Truth Behind Data Breaches. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Impact of Chinese Espionage on US Businesses and Innovation Inside Espionage: What Every American Should Kno...
Show more...
4 weeks ago
32 minutes

Cyber Crime Junkies
The Undetected. Espionage and Spies.(Part 1)
Question? Text our Studio direct. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Threat of Chinese Espionage to American National Security Inside Espionage: What Every American Should Know Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously ...
Show more...
1 month ago
32 minutes

Cyber Crime Junkies
This Supreme Court Case Could Kill Your Internet
Question? Text our Studio direct. The Supreme Court is hearing a billion-dollar piracy case that could literally change how the entire internet works. Sony says Cox Communications should be liable for customers illegally downloading music — including 10,017 songs in dispute. Cox argues: “We didn’t do it.” Leaked email: “F the DMCA!!!” Yeah… this case is pure chaos. Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done w...
Show more...
1 month ago
3 minutes

Cyber Crime Junkies
AI Exposed. Latest Social Engineering Business Cyber Risk.
Question? Text our Studio direct. Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch a Phish nick@thenetdefender.com https://thenetdefender.com/ Nick Mullen is a CISSP, CCSP, PMP and Principal, at Sanguine S...
Show more...
1 month ago
1 hour 11 minutes

Cyber Crime Junkies
CHAOS: AI Jailbreaks, Cloud Meltdowns & The Fish-Tank Casino Hack That Shocked the World
Question? Text our Studio direct. In this shocking monthly cyber update, the Cyber Crime Junkies (David, Dr. Sergio E. Sanchez, and Zack Moscow) expose the craziest, must-know stories in tech and security. What's Inside This Episode: The AI Threat is Real: Dr. Sergio reveals how Chinese threat actors manipulated Anthropic's Claude AI system to stage cyber attacks against nearly 30 companies globally. Learn how powerful Large Language Models (LLMs) are leveling the field for malicious coders.T...
Show more...
1 month ago
48 minutes

Cyber Crime Junkies
Question? Text our Studio direct. Fraud Expert Ayelet Biger joins us. Find her at her site: https://scamranger.ai/ Chapters 00:00 Introduction and Overview02:49 Shining a Light on the Victim's Perspective10:00 Creating a Seamless User Experience12:23 The Role of Behavioral Biometrics in Fraud Detection15:16 Distinguishing Between Legitimate Users and Cyber Criminals20:06 The Ecosystem of Credit Card Fraud and Identity Theft26:15 Bank Liability and Fraud28:09 Common Scams36:03 Pig Butc...