Crime Junkie publiczne
[search 0]
Więcej
Download the App!
show episodes
 
Artwork

1
Crime Junkie

audiochuck

icon
Unsubscribe
icon
Unsubscribe
Co tydzień+
 
Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're ...
  continue reading
 
Artwork

1
Tax Crime Junkies

Dominique Molina

icon
Unsubscribe
icon
Unsubscribe
Miesięcznie+
 
Hey there, Tax Crime Junkies! For those of you who are new to our show, Tax Crime Junkies is the true crime podcast that combines our love of taxes and crime, and we’re here to bring you the inside scoop on some of the most fascinating tax-related cases out there. As tax experts and practitioners ourselves, Dom and Tom are uniquely qualified to uncover the most intricate details of these cases, and we’re not afraid to go deep. We know the ins and outs of the tax system, and we’re passionate ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
Unsubscribe
Co tydzień+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Loading …
show series
 
On Christmas Eve in 1991, Dana Ireland is found tucked away in a secluded, hard to get to area of the Hawaiian subdivision Vacationland, barely clinging to life. When she finally arrives at a Hilo hospital, the damage is too severe and they declare Dana dead at 12:25am on Christmas morning. In 2023, the audiochuck team set out to tell you the story…
  continue reading
 
Crypto News, Cyber flash point about self-proclaimed Bitcoin killer, OneCoin. rise and fall of crypto star FBI most wanted, Ruja Ignatova. To Submit a TIP and Potentially collect the new $5 Million Reward, you can submit a tip online at www.tips.FBI.gov Or Call 1-800-CALL-FBI The rise and fall of ONE COIN and the hunt for Ruja Ignatova is a story o…
  continue reading
 
Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch a Phish [email protected] h…
  continue reading
 
Episode Summary: In this episode of The Fine Line Files, we pull back the curtain on the art of deception used by financial fraudsters to create the illusion of success. From lavish lifestyles to fake business ventures, scammers have long understood that the key to credibility is looking the part. But how do they pull it off? And more importantly—h…
  continue reading
 
When what should have been a carefree date goes horribly wrong, the city of Houston realizes there’s a monster in their midst. Will they be caught in time? If you have any information about the murders of Cheryl Henry & Andy Atkinson in Houston in 1990, please call the Houston Crime Stoppers tip line at 713-222-TIPS (8477). In honor of Andy & Chery…
  continue reading
 
🔥🚨NEW EPISODE 🔥🚨We delve into the Latest AI Threats To Small Business. Exposing AI Hiring Fraud! Watch to the end to see live examples of how this is happening today. Topics covered: 🔥AI Fraud in Interviews, 🔥How AI Scams Effect Business, 🔥AI Fraud In Job Interviews takeaways AI-driven fraud is a growing concern for businesses. Many resumes are now…
  continue reading
 
Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Ha…
  continue reading
 
After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing. Key Topics: new ways to reduce cyb…
  continue reading
 
Rob Black, a security educator and Fractional CISO, joins us to discuss the best ways for quantifying cyber security and why it is crucial for small and medium-sized business owners. David Mauro interviews Rob Black, the founder of Fractional CISO, about his journey in the cybersecurity industry and the challenges faced by medium-sized businesses. …
  continue reading
 
Is Ransomware Dead? Jon DiMaggio, Author of The Art of Cyber Warfare and Chief Security Researcher at Analyst 1, joins us, in this second of a two-part discussion. Here we discuss: how cyber crime is shifting gears exclusive look inside their shocking new tactics insight from the mouths of top cyber crime gang leaders. We bring you Inside the Corpo…
  continue reading
 
The discovery of 19-year-old Helen Betty Osborne’s body should have outraged the residents of The Pas, Manitoba. Yet, the truth of what happened to her, and who killed her, would remain an open secret for years. But, like all secrets, what happened that night eventually came to light – and upended over a decade of sinister silence. There is a memor…
  continue reading
 
When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss: Harnessing Emerging Tech: Imagination and AI in …
  continue reading
 
Quantum AI: What You Need to Know NOW! 🚨🔐 Quantum computing is revolutionizing cybersecurity—are we ready? In this Cyber Crime Junkies episode, we uncover how quantum tech could break encryption, threaten sensitive data, and reshape industries. But is it all bad? Discover the risks, the opportunities, and what businesses must do now to stay ahead. …
  continue reading
 
This is the story of Lester Chng, CISSP and the Art of How To Use War Games In Business. Topics discussed: how to use war games in business, understanding war game exercises in business, leveraging war games in business, how to use war games in security, how to use war games in cyber security, war games in cyber security, how war games are like tab…
  continue reading
 
💰 From “tiny classified ads” to a $52 million fraud, Don Lapre sold the American Dream—until it all came crashing down. Episode Summary Don Lapre built an empire on late-night infomercials, promising ordinary Americans the secrets to financial freedom. With high-energy pitches and over-the-top claims, he became a household name in the ‘90s, convinc…
  continue reading
 
When nine-year-old Asha Degree vanished on Valentine’s Day in 2000, it devastated her family and small town of Shelby, North Carolina. After years of little to no new information, the case has broken wide open and authorities may be closer than ever to solving what they are now saying is a murder. Ashley and Brit originally covered Asha’s case for …
  continue reading
 
In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite. KEY TOPICS: · how risk appetite effects your cyber security plans, · explaining risk appetite in cyber security to leadership, · how security planning involves risk appetite, · new ways leaders can assess the…
  continue reading
 
In 2021, we set out to cover the case of Rhys Pocan, a 35-year-old Indigenous woman who was murdered in Wisconsin in the ‘80s. But while we were in the field, we uncovered a disturbing pattern of murders with similarities to Rhys’ that were just too blatant to ignore. So, we spent the next three years working with local and federal law enforcement …
  continue reading
 
We delve into the infamous Fyre Festival, exploring the truth about fyre festival and how online fraud works. The Fyre Festival became a symbol of , how online fraudsters work. We discuss the extravagant promises made by the organizers, the disastrous execution of the event, and the legal consequences faced by its founder, Billy McFarland. Takeaway…
  continue reading
 
Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over the world. She served four combat zo…
  continue reading
 
Jane, Arnna, and Grant Beaumont disappeared nearly 60 years ago without a trace. On February 22, 2025, a third and final dig at a location of interest might give answers to a family who’s been waiting for over half a century. Source materials for this episode cannot be listed here due to character limitations. For a full list of sources, please vis…
  continue reading
 
🚨 New episode 🚨 host David Mauro engages with technology and security leaders to explore the critical roles of Network Operations Centers (NOC) and Security Operations Centers (SOC) in modern businesses. The discussion highlights how to grow business not get hacked, Navigating the NOC and SOC Landscape, New Ways To Use Tech For Business And Not Get…
  continue reading
 
Tax Crime Junkies | Episode 48 - Inside the IRS with Pietro Canestrelli (Part 2) Show Notes: Welcome back to Tax Crime Junkies for part two of our conversation with Pietro Canestrelli, a seasoned tax attorney with an insider’s view of the IRS. If you missed part one, make sure to go back and listen to Pietro’s jaw-dropping stories about life inside…
  continue reading
 
In 2021, we set out to cover the case of Rhys Pocan, a 35-year-old indigenous woman who was murdered in Wisconsin in the ‘80s. But while we were in the field, we uncovered a disturbing pattern of murders with similarities to Rhys’ that were just too blatant to ignore. So, we spent the next three years working with local and federal law enforcement …
  continue reading
 
🚨 New episode 🚨 David Mauro exposes The COM, Scattered Spider and BLACK CAT ransomware gang. Covering topics: most wanted dark web hackers, to catch a thief, truth about scattered spider, most wanted young hackers, Cyber Crime Gangs Under Cover, Exposed Secrets Of Cyber Crime Gangs, Profiling The People Who Cause Ransomware Attacks, how do hackers …
  continue reading
 
🚨New Episode 🚨We’re joined in-studio by Bryan Seely— World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ. He’s also the author of Cyber Fraud: The Web of Lies! We discuss: true ethical hacking stories, data brokers and privacy risks, wiretapping…
  continue reading
 
Loading …

Skrócona instrukcja obsługi

Posłuchaj tego programu podczas zwiedzania
Odtwarzanie