If you can never get enough true crime... Congratulations, you’ve found your people.
…
continue reading
Deep dive into true crime… where real life can be stranger than fiction! Let me know if there’s any cases you’d like to hear about! You can reach me at TrueCrimeJunkie01@gmail.com
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Home of the Vigilance Newsletter, the latest Cyber News from the Dark web, research and insider info. We interview Leaders, share True Cyber Crime and provide advice on how to advance your career. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Hey there, Tax Crime Junkies! For those of you who are new to our show, Tax Crime Junkies is the true crime podcast that combines our love of taxes and crime, and we’re here to bring you the inside scoop on some of the most fascinating tax-related cases out there. As tax experts and practitioners ourselves, Dom and Tom are uniquely qualified to uncover the most intricate details of these cases, and we’re not afraid to go deep. We know the ins and outs of the tax system, and we’re passionate ...
…
continue reading
A deep-dive into Netflix's Abducted in Plain Sight Cover art photo provided by David von Diemar on Unsplash: https://unsplash.com/@davidvondiemar
…
continue reading
1
CONSPIRACY: The Frog Boys of South Korea
50:21
50:21
Na później
Na później
Listy
Polub
Polubione
50:21
When five young boys vanish from their village in South Korea, local authorities are quick to assume they ran away. However, their parents know that’s not what happened – and as their search for their children expands, they become convinced that something terrible happened… and it’s being covered up. Source materials for this episode cannot be list…
…
continue reading
John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss …
…
continue reading
1
How To Stay Updated In Cyber Security and Business
9:58
9:58
Na później
Na później
Listy
Polub
Polubione
9:58
Details explained on blockbuster new episodes coming, weekly live-streams and our new Webinar series starts April 30th. Find details at www.CyberCrimeJunkies.com Key topics: Effective ways to protect business from cyber crime, How employees can create insider threats, How intelligence gathering is critical to security, How to stop social engineerin…
…
continue reading
1
Episode 35: The Road to Redemption: Frank Kelly's Journey Continues Part 2
28:45
28:45
Na później
Na później
Listy
Polub
Polubione
28:45
Episode Summary: In this compelling follow-up episode of "Tax Crime Junkies," hosts Dom and Tom continue their deep dive with Frank Kelly, the tax preparer whose battle against federal charges captivated our audience. In Part 2 of our exclusive interview, Kelly opens up about the aftermath of his trial, his journey towards personal and professional…
…
continue reading
1
Hidden Cyber Security Risks In Software-As-A-Service (SaaS) Platforms
38:08
38:08
Na później
Na później
Listy
Polub
Polubione
38:08
How safe are software-as-a-service platforms? Yasir Ali is the Founder and CEO of Polymer, explores hidden cyber security risks in software as a service platforms and innovative ways to reduce risks in software messaging apps. Polymer is a data loss prevention platform for Software-as-a-service platforms. It leverages AI which automates the protect…
…
continue reading
This episode includes cyber security leader, Chris Gardner a data security and recoverability expert with Rubrik (www.Rubrik.com) and we know it’s something cybercrime junkies will enjoy because it addresses the crux of cyber crime: data protection and ransomware. We dive into what to do after ransomware attack and how to plan up front so you can g…
…
continue reading
Fore more see www.cybercrimejunkies.com Find video of this on YouTube @CyberCrimeJunkiesPodcast Try KiteWorks today at www.KiteWorks.com Don't Miss our Video on this Exciting KiteWorks Offer! Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Quest…
…
continue reading
1
MYSTERIOUS DEATH OF: Joyce and John Sheridan
52:53
52:53
Na później
Na później
Listy
Polub
Polubione
52:53
Since 2014, the mysterious deaths of Joyce and John Sheridan have been a major topic of conversation in Skillman, New Jersey. And as you might expect from the title, the story I have for you today is not as cut and dry as certain city officials would have you believe. In fact, the deeper I dove into this story, the more confused, shocked, and angry…
…
continue reading
1
How Business Can Transfer Cyber Risk
41:18
41:18
Na później
Na później
Listy
Polub
Polubione
41:18
In this conversation, Jeff Severino and Nathan Borghardt discuss the importance of cyber insurance for small businesses. They share their background and approach to cyber insurance, emphasizing the need for risk transfer. They highlight 12 low-cost measures that small businesses can implement to reduce their cyber risk. The conversation also explor…
…
continue reading
After midnight on July 6th, 2012, three teenage girls walked into the thick Appalachian woods somewhere along the Mason-Dixon county line. Hours later, under the glow of a nearly full moon, only two walked out. The very last time Dave and Mary Neese saw their only child Skylar was in a grainy black-and-white video. In it, she's sneaking out of her …
…
continue reading
1
Episode 34: An Insider's Tale: Frank Kelly Speaks Out
27:35
27:35
Na później
Na później
Listy
Polub
Polubione
27:35
Episode Summary: Don't Miss - who Frank says is fat, bald headed pigtails on a flying carpet. In an unprecedented episode of "Tax Crime Junkies," hosts Dom and Tom sit down with Frank Kelly, the tax preparer at the heart of the United States v. Frank Kelly case. After navigating through a harrowing legal battle against charges of conspiracy to defr…
…
continue reading
1
UBER Crime Story 2. How Security Leaders Can be Liable.
59:41
59:41
Na później
Na później
Listy
Polub
Polubione
59:41
This episode delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, discussing how Security Leaders can be liable. This conversation discusses the Uber breach and the ongoing trial of Joseph Sullivan, the former chief security officer of Uber The conversation explores how the hacker …
…
continue reading
1
What Happened at UBER. A Crime Story. Part 1
36:33
36:33
Na później
Na później
Listy
Polub
Polubione
36:33
This episode explores the rise and controversies of Uber, including its inception, expansion, rebranding, leadership changes, autonomous vehicle program, protests, toxic culture, and legal troubles. It also delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, who faces criminal cha…
…
continue reading
Story of A dead or missing CEO, Gerald Cotten, CEO of Quadriga CX, the largest Exchange in Canada. Topics: missing ceo dead or alive, the ultimate exit scam, exit scams explained, faking death for cyber crime, exist scams for cyber crime, exist scams explained, why people fake their death, how people change identity, why people change identity, exi…
…
continue reading
1
Start-Up Fraud Stories. How They Caught Elizabeth Holmes.
52:54
52:54
Na później
Na później
Listy
Polub
Polubione
52:54
This is story of how they caught Elizabeth Holmes and the rise and fall of THERANOS. From youngest female billionaire to convict. The technology never worked as promised. Was her intent to hope that the tech would “catch up” to what they had promised investors and regulators? Or had Theranos and Elizabeth Holmes crossed the line of NO return when t…
…
continue reading
When Angela Green vanished from her home in a Kansas suburb in 2019, she left behind a web of her husband's lies and a mystery that’s been haunting her loved ones and baffling police. If you have any information about Angela’s disappearance, please contact the Prairie Village Police Department at (913) 642-6868. You can also call the Crime Stoppers…
…
continue reading
Ransomware-As-Service. What It’s Really All About. Evil Online. Come inside the minds o f the most notorious ransomware gangs. Topics: best ways to keep up to date on security news, breaking cyber crime news, getting to know the people behind ransomware, how ransomware kills in real life, how to limit cyber attack liability, how to limit liability …
…
continue reading
1
Compliance vs Security. What it Means.
1:07:56
1:07:56
Na później
Na później
Listy
Polub
Polubione
1:07:56
How to Improve Compliance Audits with Security in Mind with special guest Paul Perry. Video episode Here. Paul is a CPA, a Member of the Warren Averett firm and practice leader of the Security, Risk and Controls Group. Paul and his team @ Warren Averett focus on cybersecurity, risk assessments, internal controls & internal for major clients across …
…
continue reading
1
A Story of Innovation in Privacy. Merry Marwig.
55:33
55:33
Na później
Na później
Listy
Polub
Polubione
55:33
This is the story of Merry Marwig and Innovative Approaches To Data Privacy. Second Episode in series on Privacy with Merry. Merry Marwig, a privacy professional with DataGrail, discusses how to reduce risk when managing data privacy. She emphasizes the value and power of data, as well as the need for transparency and consent. Merry also discusses …
…
continue reading
1
Why Facebook Was Down. Exit Scams and Cyber Crime.
26:44
26:44
Na później
Na później
Listy
Polub
Polubione
26:44
We discuss the recent Facebook outage and explores possible causes, including technical issues and DDoS attacks. The conversation then delves into the importance of reputation for cybercrime gangs and the impact of law enforcement on disrupting their operations. The focus shifts to the exit scam of Black Hat and AlphaV, two prominent cybercrime gan…
…
continue reading
1
How To Reduce Risk When Managing Data Privacy. Merry Marwig.
40:42
40:42
Na później
Na później
Listy
Polub
Polubione
40:42
Merry Marwig, a privacy professional with DataGrail, discusses how to reduce risk when managing data privacy. We explore the importance of privacy in today's digital world. She shares her personal journey into the field of privacy and highlights the need for awareness and education. Merry explains the impact of privacy harms and the vast amount of …
…
continue reading
Ohio State Highway Patrol were identifying unknown remains along the side of a highway in northern Ohio at the same time a man in Michigan was being reported missing. Now, over 5 years later, U.S. Marshals are still searching for the culprit of this despicable crime. And they know exactly who they’re looking for, she’s just been on the run since 20…
…
continue reading
Joined by covert investigator and analyst with Searchlight Cyber (www.slcyber.io), which helps law enforcement with Dark Web Investigations and Best-selling author, Chris Hadnagy, founder of the Innocent Lives Foundation (www.innocentlivesfoundation.org) who helps law enforcement with ways to help prosecute online predators. We discuss topics on da…
…
continue reading
1
Episode 33 The Case of the Cautious Preparer
52:16
52:16
Na później
Na później
Listy
Polub
Polubione
52:16
Episode Summary: In this gripping episode of "Tax Crime Junkies," hosts Dom and Tom delve into the captivating case of United States v. Frank Kelly, a story that navigates the murky waters of tax law, justice, and the lengths to which individuals will go to contest the might of the IRS. Set against the backdrop of a seemingly innocuous auto repair …
…
continue reading
1
Crime Stories Exposing Cyber Criminals
1:05:11
1:05:11
Na później
Na później
Listy
Polub
Polubione
1:05:11
Top security researcher, Jon DiMaggio of Analyst 1 joins us to discuss his recent findings in Ransomware Diaries Vol 4. https://analyst1.com/ransomware-diaries-volume-4/#Significant_Findings Discussing how to expose cyber criminals how to expose cyber criminals and how he exposed RansomVC, how they caused a class action suit based on fake facts and…
…
continue reading
1
SERIAL KILLER: The Alphabet Murders Part 2
49:11
49:11
Na później
Na później
Listy
Polub
Polubione
49:11
Dozens of commuters see a young girl fleeing a car on the side of the expressway in Rochester, NY, but no one pulls over to help. The community is devastated when her body is discovered just days later, but it’s assumed to be a tragic but isolated incident. But when more young girls go missing…only to have their bodies discovered within days in a s…
…
continue reading
This is the story of Lester Chng, CISSP and the Art of How To Use War Games In Business. Topics discussed: how to use war games in business, understanding war game exercises in business, leveraging war games in business, how to use war games in security, how to use war games in cyber security, war games in cyber security, how war games are like tab…
…
continue reading