Crime Junkie открытые
[search 0]
Больше
Download the App!
show episodes
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies-David Mauro

Unsubscribe
Unsubscribe
Еженедельно+
 
Socializing Cybersecurity. Translating Cyber into business terms. Home of the Vigilance Newsletter, the latest Cyber News from the Dark web, research and insider info. We interview Leaders, share True Cyber Crime and provide advice on how to advance your career. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
True Crime Junkie

The Who, The What, The Why

Unsubscribe
Unsubscribe
Ежемесячно
 
Deep dive into true crime… where real life can be stranger than fiction! Let me know if there’s any cases you’d like to hear about! You can reach me at TrueCrimeJunkie01@gmail.com
  continue reading
 
Artwork

1
Tax Crime Junkies

Dominique Molina

Unsubscribe
Unsubscribe
Ежемесячно+
 
Hey there, Tax Crime Junkies! For those of you who are new to our show, Tax Crime Junkies is the true crime podcast that combines our love of taxes and crime, and we’re here to bring you the inside scoop on some of the most fascinating tax-related cases out there. As tax experts and practitioners ourselves, Dom and Tom are uniquely qualified to uncover the most intricate details of these cases, and we’re not afraid to go deep. We know the ins and outs of the tax system, and we’re passionate ...
  continue reading
 
Loading …
show series
 
When five young boys vanish from their village in South Korea, local authorities are quick to assume they ran away. However, their parents know that’s not what happened – and as their search for their children expands, they become convinced that something terrible happened… and it’s being covered up. Source materials for this episode cannot be list…
  continue reading
 
John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss …
  continue reading
 
Details explained on blockbuster new episodes coming, weekly live-streams and our new Webinar series starts April 30th. Find details at www.CyberCrimeJunkies.com Key topics: Effective ways to protect business from cyber crime, How employees can create insider threats, How intelligence gathering is critical to security, How to stop social engineerin…
  continue reading
 
Episode Summary: In this compelling follow-up episode of "Tax Crime Junkies," hosts Dom and Tom continue their deep dive with Frank Kelly, the tax preparer whose battle against federal charges captivated our audience. In Part 2 of our exclusive interview, Kelly opens up about the aftermath of his trial, his journey towards personal and professional…
  continue reading
 
How safe are software-as-a-service platforms? Yasir Ali is the Founder and CEO of Polymer, explores hidden cyber security risks in software as a service platforms and innovative ways to reduce risks in software messaging apps. Polymer is a data loss prevention platform for Software-as-a-service platforms. It leverages AI which automates the protect…
  continue reading
 
This episode includes cyber security leader, Chris Gardner a data security and recoverability expert with Rubrik (www.Rubrik.com) and we know it’s something cybercrime junkies will enjoy because it addresses the crux of cyber crime: data protection and ransomware. We dive into what to do after ransomware attack and how to plan up front so you can g…
  continue reading
 
Fore more see www.cybercrimejunkies.com Find video of this on YouTube @CyberCrimeJunkiesPodcast Try KiteWorks today at www.KiteWorks.com Don't Miss our Video on this Exciting KiteWorks Offer! Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Quest…
  continue reading
 
Since 2014, the mysterious deaths of Joyce and John Sheridan have been a major topic of conversation in Skillman, New Jersey. And as you might expect from the title, the story I have for you today is not as cut and dry as certain city officials would have you believe. In fact, the deeper I dove into this story, the more confused, shocked, and angry…
  continue reading
 
In this conversation, Jeff Severino and Nathan Borghardt discuss the importance of cyber insurance for small businesses. They share their background and approach to cyber insurance, emphasizing the need for risk transfer. They highlight 12 low-cost measures that small businesses can implement to reduce their cyber risk. The conversation also explor…
  continue reading
 
After midnight on July 6th, 2012, three teenage girls walked into the thick Appalachian woods somewhere along the Mason-Dixon county line. Hours later, under the glow of a nearly full moon, only two walked out. The very last time Dave and Mary Neese saw their only child Skylar was in a grainy black-and-white video. In it, she's sneaking out of her …
  continue reading
 
Episode Summary: Don't Miss - who Frank says is fat, bald headed pigtails on a flying carpet. In an unprecedented episode of "Tax Crime Junkies," hosts Dom and Tom sit down with Frank Kelly, the tax preparer at the heart of the United States v. Frank Kelly case. After navigating through a harrowing legal battle against charges of conspiracy to defr…
  continue reading
 
This episode delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, discussing how Security Leaders can be liable. This conversation discusses the Uber breach and the ongoing trial of Joseph Sullivan, the former chief security officer of Uber The conversation explores how the hacker …
  continue reading
 
This episode explores the rise and controversies of Uber, including its inception, expansion, rebranding, leadership changes, autonomous vehicle program, protests, toxic culture, and legal troubles. It also delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, who faces criminal cha…
  continue reading
 
Story of A dead or missing CEO, Gerald Cotten, CEO of Quadriga CX, the largest Exchange in Canada. Topics: missing ceo dead or alive, the ultimate exit scam, exit scams explained, faking death for cyber crime, exist scams for cyber crime, exist scams explained, why people fake their death, how people change identity, why people change identity, exi…
  continue reading
 
This is story of how they caught Elizabeth Holmes and the rise and fall of THERANOS. From youngest female billionaire to convict. The technology never worked as promised. Was her intent to hope that the tech would “catch up” to what they had promised investors and regulators? Or had Theranos and Elizabeth Holmes crossed the line of NO return when t…
  continue reading
 
When Angela Green vanished from her home in a Kansas suburb in 2019, she left behind a web of her husband's lies and a mystery that’s been haunting her loved ones and baffling police. If you have any information about Angela’s disappearance, please contact the Prairie Village Police Department at (913) 642-6868. You can also call the Crime Stoppers…
  continue reading
 
Ransomware-As-Service. What It’s Really All About. Evil Online. Come inside the minds o f the most notorious ransomware gangs. Topics: best ways to keep up to date on security news, breaking cyber crime news, getting to know the people behind ransomware, how ransomware kills in real life, how to limit cyber attack liability, how to limit liability …
  continue reading
 
How to Improve Compliance Audits with Security in Mind with special guest Paul Perry. Video episode Here. Paul is a CPA, a Member of the Warren Averett firm and practice leader of the Security, Risk and Controls Group. Paul and his team @ Warren Averett focus on cybersecurity, risk assessments, internal controls & internal for major clients across …
  continue reading
 
This is the story of Merry Marwig and Innovative Approaches To Data Privacy. Second Episode in series on Privacy with Merry. Merry Marwig, a privacy professional with DataGrail, discusses how to reduce risk when managing data privacy. She emphasizes the value and power of data, as well as the need for transparency and consent. Merry also discusses …
  continue reading
 
We discuss the recent Facebook outage and explores possible causes, including technical issues and DDoS attacks. The conversation then delves into the importance of reputation for cybercrime gangs and the impact of law enforcement on disrupting their operations. The focus shifts to the exit scam of Black Hat and AlphaV, two prominent cybercrime gan…
  continue reading
 
Merry Marwig, a privacy professional with DataGrail, discusses how to reduce risk when managing data privacy. We explore the importance of privacy in today's digital world. She shares her personal journey into the field of privacy and highlights the need for awareness and education. Merry explains the impact of privacy harms and the vast amount of …
  continue reading
 
Ohio State Highway Patrol were identifying unknown remains along the side of a highway in northern Ohio at the same time a man in Michigan was being reported missing. Now, over 5 years later, U.S. Marshals are still searching for the culprit of this despicable crime. And they know exactly who they’re looking for, she’s just been on the run since 20…
  continue reading
 
Joined by covert investigator and analyst with Searchlight Cyber (www.slcyber.io), which helps law enforcement with Dark Web Investigations and Best-selling author, Chris Hadnagy, founder of the Innocent Lives Foundation (www.innocentlivesfoundation.org) who helps law enforcement with ways to help prosecute online predators. We discuss topics on da…
  continue reading
 
Episode Summary: In this gripping episode of "Tax Crime Junkies," hosts Dom and Tom delve into the captivating case of United States v. Frank Kelly, a story that navigates the murky waters of tax law, justice, and the lengths to which individuals will go to contest the might of the IRS. Set against the backdrop of a seemingly innocuous auto repair …
  continue reading
 
Top security researcher, Jon DiMaggio of Analyst 1 joins us to discuss his recent findings in Ransomware Diaries Vol 4. https://analyst1.com/ransomware-diaries-volume-4/#Significant_Findings Discussing how to expose cyber criminals how to expose cyber criminals and how he exposed RansomVC, how they caused a class action suit based on fake facts and…
  continue reading
 
Dozens of commuters see a young girl fleeing a car on the side of the expressway in Rochester, NY, but no one pulls over to help. The community is devastated when her body is discovered just days later, but it’s assumed to be a tragic but isolated incident. But when more young girls go missing…only to have their bodies discovered within days in a s…
  continue reading
 
This is the story of Lester Chng, CISSP and the Art of How To Use War Games In Business. Topics discussed: how to use war games in business, understanding war game exercises in business, leveraging war games in business, how to use war games in security, how to use war games in cyber security, war games in cyber security, how war games are like tab…
  continue reading
 
Loading …

Краткое руководство