Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.
undefined
Jul 3, 2024 • 46min

FBI vs Cyber Crime. EXCLUSIVE Scott Augenbaum Interview.

Former FBI Special Agent who served with the FBI’s original Cyber Crime division, well respected public speaker, author and TV consultant on personal cybersecurity education Scott Augenbaum joins David Mauro in the studio.We discuss: how a cyber security mindset works, how fbi fights cyber crime, personal cybersecurity education, cyber security mindset, individual user audits, how to educate users, and how cyber crime is like the mafia.https://CYBERSECURITYMINDSET.comQuestion? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Exclusive Offers for our Listeners! 🔥 1. Remove Your Data Online Today! Try OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 2. Or Turn it over to the Pros at DELETE ME and get 20% Off! Remove your data with 24/7 data broker monitoring. 🔥Sign up here and Get 20% off DELETE ME 3. 🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today risk free: https://try.elevenlabs.io/gla58o32c6hq Dive Deeper: 🔗 Website: https://cybercrimejunkies.com 📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ ===========================================================
undefined
Jun 30, 2024 • 1min

New! Cyber Flash Points. Season 5.

We're thrilled to introduce Season 5 Cyber Flash Points to show what latest tech news means to online safety with short stories helping spread security awareness and the importance of online privacy protection.A fresh, exciting twist to our podcast this season! "Cyber Flash Points" – your go-to source for practical and concise summaries.So, tune in, stay secure, and enjoy our new bite-sized practical segments Welcome to the future of cyber awareness and news – welcome to season 5 of CCJ and welcome to "Cyber Flash Points”Hey before you go did you know over 80% of our YT viewers do not subscribe? What is the deal with that?! It’s free.  We don’t sell your data, contact you or spam you, so do us a very important favor and SUBSCRIBE to our YouTube channel @CyberCrimeJunkiesPodcast: http://www.youtube.com/@cybercrimejunkiespodcastQuestion? Text our Studio direct.Support the show🔥New Exclusive Offers for our Listeners! 🔥 1. Remove Your Data Online Today! Try OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 2. Or Turn it over to the Pros at DELETE ME and get 20% Off! Remove your data with 24/7 data broker monitoring. 🔥Sign up here and Get 20% off DELETE ME 3. 🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today risk free: https://try.elevenlabs.io/gla58o32c6hq Dive Deeper: 🔗 Website: https://cybercrimejunkies.com 📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ ===========================================================
undefined
May 15, 2024 • 1h 1min

Customers or Enemies Online.

Richard Hollis of Risk Crew in London joins Cyber Crime Junkies studio discussing key topics: why cybersecurity efforts usually fail and customers or enemies online. Video episode: https://youtu.be/QQ8l1PaDaUI Topics:💡how cybersecurity efforts usually fail, 💡customers or enemies online💡best practices for businesses to limit cyber liability, 💡new ways to protect business from cyber crime, 💡newest methods to limit cyber liability, 💡newest security expert insightQuestion? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Exclusive Offers for our Listeners! 🔥 1. Remove Your Data Online Today! Try OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 2. Or Turn it over to the Pros at DELETE ME and get 20% Off! Remove your data with 24/7 data broker monitoring. 🔥Sign up here and Get 20% off DELETE ME 3. 🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today risk free: https://try.elevenlabs.io/gla58o32c6hq Dive Deeper: 🔗 Website: https://cybercrimejunkies.com 📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ ===========================================================
undefined
May 11, 2024 • 51min

New Approaches to Enter the Cybersecurity Field

Sam Buckenmaier, a senior cyber leader,  join us on what leadership means today and what employers want in cybersecurity.We discussed: new approaches to enter the cybersecurity field, how to have effective communication internally in business, advice on cybersecurity careers from top recruiters, approaches to enter cybersecurity,  and best practices for leveraging LinkedIn for your personal brand.🔔 Site, Research and Direct contact with Podcast team: https://cybercrimejunkies.com Question? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Exclusive Offers for our Listeners! 🔥 1. Remove Your Data Online Today! Try OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 2. Or Turn it over to the Pros at DELETE ME and get 20% Off! Remove your data with 24/7 data broker monitoring. 🔥Sign up here and Get 20% off DELETE ME 3. 🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today risk free: https://try.elevenlabs.io/gla58o32c6hq Dive Deeper: 🔗 Website: https://cybercrimejunkies.com 📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ ===========================================================
undefined
May 10, 2024 • 54min

New Insight on True Cyber Crime Examples.

What we all need to know about How Psychology Affects Security. Psychology of Online Security. Topics: behind scenes cyber criminals, best ways to protect business from cyber crime, cyber crime gang discussions, exposing cyber crime gangs, exposing secrets of cyber crime gangs, how can we spot fraud in business, how to limit liability from data breach, new insight on true cyber crime examples, risk and brand protectionWe wanted to explore in today’s episode what makes them tick. Why is it some organizations are only in the news for new products that they launch, people that they save or a new location that they’re opening.  All positive things. But other organizations are in the news for reputation damaging data breach. Today we are going to explore the mind of a hacker and reset expectations of the language that we use. Hackers are not evil in fact there are several different types of hackers. Hackers are engineers and people that figure out how things work. Without them we wouldn’t have some of the greatest inventions and protections that we all take for granted every day.Question? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Exclusive Offers for our Listeners! 🔥 1. Remove Your Data Online Today! Try OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 2. Or Turn it over to the Pros at DELETE ME and get 20% Off! Remove your data with 24/7 data broker monitoring. 🔥Sign up here and Get 20% off DELETE ME 3. 🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today risk free: https://try.elevenlabs.io/gla58o32c6hq Dive Deeper: 🔗 Website: https://cybercrimejunkies.com 📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ ===========================================================
undefined
Apr 20, 2024 • 29min

How Secrets in Hostage Negotiation created Never Split The Difference. Pt 2.

Chris Voss joins us to go INSIDE the famous negotiation model he created and share secrets behind Never Split the Difference, from the #1 Wall Street Journal best-selling book on Negotiation. Chris is the most decorated FBI hostage negotiator in history. He teaches his techniques at Harvard Law, Georgetown University, and others. He is the founder of the Black Swan Group.Key Takeaways  The Importance of Proof of Life in NegotiationUsing Decreasing Incremental Change in BargainingHow Accusation Audits work, How Tactical Empathy and Espionage are used,modern ways to negotiate effectively,how to ask questions better using Never Split the Difference,how to negotiate with an enemy, how to discover unknowns in negotiationnew ways to convince someone of anything,and other secrets behind Never Split the Difference. Chapters00:00 Introduction to the Never Split the Difference Method02:15 Mastering the Never Split the Difference Method of Negotiation03:11 The Power of Active Listening and Tactical Empathy05:31 Uncovering Concealed Motivations and Undisclosed Needs07:22 The Importance of Proof of Life in Negotiations08:44 Using Decreasing Incremental Change in Bargaining10:41 Dealing with Aggressive Individuals and Building Agreement To grab your copy of Never Split The Difference you can buy it here (not an affiliate link). https://a.co/d/229P5UVTo find more of Chris Voss and The Black Swan Group: https://www.blackswanltd.com/  Question? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Exclusive Offers for our Listeners! 🔥 1. Remove Your Data Online Today! Try OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 2. Or Turn it over to the Pros at DELETE ME and get 20% Off! Remove your data with 24/7 data broker monitoring. 🔥Sign up here and Get 20% off DELETE ME 3. 🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today risk free: https://try.elevenlabs.io/gla58o32c6hq Dive Deeper: 🔗 Website: https://cybercrimejunkies.com 📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ ===========================================================
undefined
Apr 20, 2024 • 36min

Inside Story of Chris Voss and Never Split The Difference Pt 1

Chris Voss, founder of the Black Swan Group,  joins us to share the story behind Never Split The Difference, the #1 Wall Street Journal best selling book on Negotiation. The most decorated FBI hostage negotiator in history, Chris Voss teaches his model Harvard Law, Georgetown University and others. Key Takeaways how never split the difference started,Optimal Timing for NegotiationsThe Neuroscience Behind Tactical Empathybest ways to collaborate in negotiations,ways to negotiate like your life depended on it,best ways to collaborate in negotiations,how to practice Never Split the Difference,benefits of using active listening and importance of body language in communications,and other top techniques in Never Split the Difference,Chapters00:00 Introduction to Chris Voss and the Black Swan Method03:34 Chris Voss's Background and the Documentary04:04 Chris Voss's Journey into Law Enforcement06:26 Mentors and Becoming a Hostage Negotiator09:22 The Foundation of the Black Swan Method14:14 Developing Tactical Empathy on a Suicide Hotline21:36 Practicing and Applying the Black Swan Method24:30 Optimal Timing for Negotiations28:22 Tactical Empathy with Adversaries32:40 Defining Tactical Empathy34:41 The Future of Tactical Empathy and NeuroscienceTo grab your copy of Never Split The Difference you can buy it here (not an affiliate link). https://a.co/d/229P5UVTo find more of Chris Voss and The Black Swan Group: https://www.blackswanltd.com/Question? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Exclusive Offers for our Listeners! 🔥 1. Remove Your Data Online Today! Try OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 2. Or Turn it over to the Pros at DELETE ME and get 20% Off! Remove your data with 24/7 data broker monitoring. 🔥Sign up here and Get 20% off DELETE ME 3. 🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today risk free: https://try.elevenlabs.io/gla58o32c6hq Dive Deeper: 🔗 Website: https://cybercrimejunkies.com 📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ ===========================================================
undefined
Apr 14, 2024 • 47min

The Story Behind the Sony Data Breach 2014

This is the True Cyber Crime Story of “The Day the Lights Went Out at Sony Pictures” in 2014. Discussion about then events, what led to it, the formal findings and open questions remaining by experts. Hosts David Mauro and Mark Mosher explore their research with Special Guest, professional coach Rich Moore.SummaryThe conversation discusses the Sony Pictures cyberattack in 2014, exploring the various theories and implications of the breach. The hosts highlight the impact of the attack on Sony and the movie industry, as well as the broader implications for cybersecurity. They delve into the different theories surrounding the attack, including North Korea's involvement, insider activity, and stock manipulation. The conversation raises questions about the role of smaller organizations and the potential vulnerabilities they face. Overall, the discussion emphasizes the need for increased cybersecurity measures and awareness. The conversation explores different theories surrounding the Sony Pictures hack in 2014. The main theories discussed include: 1) North Korea as the sole perpetrator, 2) a disgruntled insider with connections to black hat hackers, 3) hacktivist groups like LulzSec and Anonymous, and 4) stock manipulation. The conversation highlights the inconsistencies and unanswered questions surrounding the official narrative that North Korea was solely responsible for the hack. The participants lean towards the theory that an insider with help from black hat hackers orchestrated the attack. They also discuss the possibility of stock manipulation and the involvement of hacktivist groups. The conversation concludes with the acknowledgment that there may be information that is not publicly available due to national security concerns.Chapters00:00 The Day the Lights Went Out at Sony Pictures13:55 The Lights Get Turned Out: Implications and Theories31:43 The Insider Threat: A Disgruntled Employee with Black Hat Connections43:12 National Security and UnQuestion? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Exclusive Offers for our Listeners! 🔥 1. Remove Your Data Online Today! Try OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 2. Or Turn it over to the Pros at DELETE ME and get 20% Off! Remove your data with 24/7 data broker monitoring. 🔥Sign up here and Get 20% off DELETE ME 3. 🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today risk free: https://try.elevenlabs.io/gla58o32c6hq Dive Deeper: 🔗 Website: https://cybercrimejunkies.com 📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ ===========================================================
undefined
Apr 6, 2024 • 38min

New Ways to Reduce Risks from Deep Fake

Are you real? What will Deepfake do to Security Risk? Shocking Examples. SummaryIn this conversation, Dino Mauro and Mark Mosher discuss the rise of deepfake technology and its implications for individuals, families, and organizations. They explore the real-world applications of deepfake, the advancements in technology, and the dangers it poses in terms of cybercrime. The conversation highlights the use of deepfake in cyberbullying, fraud, and social engineering attacks, as well as its potential to compromise organizations through fake employment interviews. The hosts also touch on the involvement of federal agencies and Congress in addressing the deepfake threat. The conversation emphasizes the need for awareness and vigilance in the face of this rapidly evolving technology.Topics: How Deep Fake Videos Increase Security Risks, why deep fake videos are dangerous, why deep fake videos increase security risks, new ways to reduce risks from deep fakes, dangers of synthetic media, new dangers of synthetic media, artificial intelligence risks in cyber security, new ways to reduce risk from deep fakes, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, how is ai making it harder to detect deep fakes, how ai is making it harder to detect deep fakes, Chapters00:00 Introduction: The Need for Secure Managed File Transfer05:12 Chapter 2: Deepfake's Real-World Applications and Damages12:58 Chapter 3: Deepfake in Fake Employment Interviews  In this episode: Latest News on Deepfake. What We All Need to Know. Synthetic Media. We get into something cutting edge and a new emerging threat to our reality.You may not know the term Synthetic Media but you likely have heard of the phrase DEEPFAKE from socialQuestion? Text our Studio direct.Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com   Support the show🔥New Exclusive Offers for our Listeners! 🔥 1. Remove Your Data Online Today! Try OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 2. Or Turn it over to the Pros at DELETE ME and get 20% Off! Remove your data with 24/7 data broker monitoring. 🔥Sign up here and Get 20% off DELETE ME 3. 🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today risk free: https://try.elevenlabs.io/gla58o32c6hq Dive Deeper: 🔗 Website: https://cybercrimejunkies.com 📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ ===========================================================
undefined
Mar 28, 2024 • 9min

How To Stay Updated In Cyber Security and Business

Details explained on blockbuster new episodes coming, weekly live-streams and our new Webinar series starts April 30th.Find details at www.CyberCrimeJunkies.comKey topics:Effective ways to protect business from cyber crime, How employees can create insider threats, How intelligence gathering is critical to security, How to stop social engineering, Importance of visibility into operational risk, Most common hacking tactics, New approach to build a security culture,Question? Text our Studio direct.Support the show🔥New Exclusive Offers for our Listeners! 🔥 1. Remove Your Data Online Today! Try OPTERY Risk Free. Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 2. Or Turn it over to the Pros at DELETE ME and get 20% Off! Remove your data with 24/7 data broker monitoring. 🔥Sign up here and Get 20% off DELETE ME 3. 🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today risk free: https://try.elevenlabs.io/gla58o32c6hq Dive Deeper: 🔗 Website: https://cybercrimejunkies.com 📰 Chaos Newsletter: https://open.substack.com/pub/chaosbrief ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ ===========================================================

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app