Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're ...
…
continue reading
Deep dive into true crime… where real life can be stranger than fiction! Let me know if there’s any cases you’d like to hear about! You can reach me at [email protected]
…
continue reading
Hey there, Tax Crime Junkies! For those of you who are new to our show, Tax Crime Junkies is the true crime podcast that combines our love of taxes and crime, and we’re here to bring you the inside scoop on some of the most fascinating tax-related cases out there. As tax experts and practitioners ourselves, Dom and Tom are uniquely qualified to uncover the most intricate details of these cases, and we’re not afraid to go deep. We know the ins and outs of the tax system, and we’re passionate ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
A deep-dive into Netflix's Abducted in Plain Sight Cover art photo provided by David von Diemar on Unsplash: https://unsplash.com/@davidvondiemar
…
continue reading
On Christmas Eve in 1991, Dana Ireland is found tucked away in a secluded, hard to get to area of the Hawaiian subdivision Vacationland, barely clinging to life. When she finally arrives at a Hilo hospital, the damage is too severe and they declare Dana dead at 12:25am on Christmas morning. In 2023, the audiochuck team set out to tell you the story…
…
continue reading

1
Rise And Fall of Crypto Star. FBI most wanted, Ruja Ignatova. Crypto News.
39:03
39:03
Na później
Na później
Listy
Polub
Polubione
39:03Crypto News, Cyber flash point about self-proclaimed Bitcoin killer, OneCoin. rise and fall of crypto star FBI most wanted, Ruja Ignatova. To Submit a TIP and Potentially collect the new $5 Million Reward, you can submit a tip online at www.tips.FBI.gov Or Call 1-800-CALL-FBI The rise and fall of ONE COIN and the hunt for Ruja Ignatova is a story o…
…
continue reading

1
AI Exposed. Latest Social Engineering Business Cyber Risk.
1:10:05
1:10:05
Na później
Na później
Listy
Polub
Polubione
1:10:05Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch a Phish [email protected] h…
…
continue reading

1
The Fine Line Files: The Illusion of Wealth – How Scammers Convince You They’re Successful
10:15
10:15
Na później
Na później
Listy
Polub
Polubione
10:15Episode Summary: In this episode of The Fine Line Files, we pull back the curtain on the art of deception used by financial fraudsters to create the illusion of success. From lavish lifestyles to fake business ventures, scammers have long understood that the key to credibility is looking the part. But how do they pull it off? And more importantly—h…
…
continue reading
When what should have been a carefree date goes horribly wrong, the city of Houston realizes there’s a monster in their midst. Will they be caught in time? If you have any information about the murders of Cheryl Henry & Andy Atkinson in Houston in 1990, please call the Houston Crime Stoppers tip line at 713-222-TIPS (8477). In honor of Andy & Chery…
…
continue reading

1
Hiring Fraud Exposed! Latest AI Threats to Business.
29:20
29:20
Na później
Na później
Listy
Polub
Polubione
29:20🔥🚨NEW EPISODE 🔥🚨We delve into the Latest AI Threats To Small Business. Exposing AI Hiring Fraud! Watch to the end to see live examples of how this is happening today. Topics covered: 🔥AI Fraud in Interviews, 🔥How AI Scams Effect Business, 🔥AI Fraud In Job Interviews takeaways AI-driven fraud is a growing concern for businesses. Many resumes are now…
…
continue reading

1
Zero Trust. Social Engineering. Ron Woerner.
44:19
44:19
Na później
Na później
Listy
Polub
Polubione
44:19Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Ha…
…
continue reading

1
Innovative Ways to Reduce Website Spoofing
59:25
59:25
Na później
Na później
Listy
Polub
Polubione
59:25After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing. Key Topics: new ways to reduce cyb…
…
continue reading

1
Unmasking Invisible Threats: Quantifying Cyber Security
1:04:12
1:04:12
Na później
Na później
Listy
Polub
Polubione
1:04:12Rob Black, a security educator and Fractional CISO, joins us to discuss the best ways for quantifying cyber security and why it is crucial for small and medium-sized business owners. David Mauro interviews Rob Black, the founder of Fractional CISO, about his journey in the cybersecurity industry and the challenges faced by medium-sized businesses. …
…
continue reading

1
Is Ransomware Dead? What Cyber Criminals Are Saying.
34:03
34:03
Na później
Na później
Listy
Polub
Polubione
34:03Is Ransomware Dead? Jon DiMaggio, Author of The Art of Cyber Warfare and Chief Security Researcher at Analyst 1, joins us, in this second of a two-part discussion. Here we discuss: how cyber crime is shifting gears exclusive look inside their shocking new tactics insight from the mouths of top cyber crime gang leaders. We bring you Inside the Corpo…
…
continue reading
The discovery of 19-year-old Helen Betty Osborne’s body should have outraged the residents of The Pas, Manitoba. Yet, the truth of what happened to her, and who killed her, would remain an open secret for years. But, like all secrets, what happened that night eventually came to light – and upended over a decade of sinister silence. There is a memor…
…
continue reading

1
Harnessing Emerging Tech: Imagination and AI in Brand Growth, and the Perils of 'Too Big to Fail"
57:25
57:25
Na później
Na później
Listy
Polub
Polubione
57:25When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss: Harnessing Emerging Tech: Imagination and AI in …
…
continue reading

1
Phone Rings. It's A Social Engineer Callling.
58:17
58:17
Na później
Na później
Listy
Polub
Polubione
58:17Autor: Cyber Crime Junkies. Host David Mauro.
…
continue reading

1
Quantum AI: What You Need to Know NOW!
31:35
31:35
Na później
Na później
Listy
Polub
Polubione
31:35Quantum AI: What You Need to Know NOW! 🚨🔐 Quantum computing is revolutionizing cybersecurity—are we ready? In this Cyber Crime Junkies episode, we uncover how quantum tech could break encryption, threaten sensitive data, and reshape industries. But is it all bad? Discover the risks, the opportunities, and what businesses must do now to stay ahead. …
…
continue reading
This is the story of Lester Chng, CISSP and the Art of How To Use War Games In Business. Topics discussed: how to use war games in business, understanding war game exercises in business, leveraging war games in business, how to use war games in security, how to use war games in cyber security, war games in cyber security, how war games are like tab…
…
continue reading

1
Episode 49 Tiny Ads, Big Fraud: The Rise and Fall of Don Lapre
34:43
34:43
Na później
Na później
Listy
Polub
Polubione
34:43💰 From “tiny classified ads” to a $52 million fraud, Don Lapre sold the American Dream—until it all came crashing down. Episode Summary Don Lapre built an empire on late-night infomercials, promising ordinary Americans the secrets to financial freedom. With high-energy pitches and over-the-top claims, he became a household name in the ‘90s, convinc…
…
continue reading
When nine-year-old Asha Degree vanished on Valentine’s Day in 2000, it devastated her family and small town of Shelby, North Carolina. After years of little to no new information, the case has broken wide open and authorities may be closer than ever to solving what they are now saying is a murder. Ashley and Brit originally covered Asha’s case for …
…
continue reading

1
New Ways Leaders Can Assess Their Risk Appetite
53:22
53:22
Na później
Na później
Listy
Polub
Polubione
53:22In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite. KEY TOPICS: · how risk appetite effects your cyber security plans, · explaining risk appetite in cyber security to leadership, · how security planning involves risk appetite, · new ways leaders can assess the…
…
continue reading

1
WANTED: Justice for Rhys Pocan & MMIW Part 2
50:35
50:35
Na później
Na później
Listy
Polub
Polubione
50:35In 2021, we set out to cover the case of Rhys Pocan, a 35-year-old Indigenous woman who was murdered in Wisconsin in the ‘80s. But while we were in the field, we uncovered a disturbing pattern of murders with similarities to Rhys’ that were just too blatant to ignore. So, we spent the next three years working with local and federal law enforcement …
…
continue reading

1
🔥 Truth About FYRE Festival🔥 How Online Fraud Works
32:33
32:33
Na później
Na później
Listy
Polub
Polubione
32:33We delve into the infamous Fyre Festival, exploring the truth about fyre festival and how online fraud works. The Fyre Festival became a symbol of , how online fraudsters work. We discuss the extravagant promises made by the organizers, the disastrous execution of the event, and the legal consequences faced by its founder, Billy McFarland. Takeaway…
…
continue reading

1
Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security
55:48
55:48
Na później
Na później
Listy
Polub
Polubione
55:48Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over the world. She served four combat zo…
…
continue reading
Jane, Arnna, and Grant Beaumont disappeared nearly 60 years ago without a trace. On February 22, 2025, a third and final dig at a location of interest might give answers to a family who’s been waiting for over half a century. Source materials for this episode cannot be listed here due to character limitations. For a full list of sources, please vis…
…
continue reading

1
Secrets Revealed--How To Grow Business Not Get Hacked🔥
38:47
38:47
Na później
Na później
Listy
Polub
Polubione
38:47🚨 New episode 🚨 host David Mauro engages with technology and security leaders to explore the critical roles of Network Operations Centers (NOC) and Security Operations Centers (SOC) in modern businesses. The discussion highlights how to grow business not get hacked, Navigating the NOC and SOC Landscape, New Ways To Use Tech For Business And Not Get…
…
continue reading

1
Episode 48 - From IRS Insider to America's Tax Defender The Battle Against Tax Crimes (Part 2)
26:13
26:13
Na później
Na później
Listy
Polub
Polubione
26:13Tax Crime Junkies | Episode 48 - Inside the IRS with Pietro Canestrelli (Part 2) Show Notes: Welcome back to Tax Crime Junkies for part two of our conversation with Pietro Canestrelli, a seasoned tax attorney with an insider’s view of the IRS. If you missed part one, make sure to go back and listen to Pietro’s jaw-dropping stories about life inside…
…
continue reading

1
WANTED: Justice for Rhys Pocan & MMIW Part 1
50:09
50:09
Na później
Na później
Listy
Polub
Polubione
50:09In 2021, we set out to cover the case of Rhys Pocan, a 35-year-old indigenous woman who was murdered in Wisconsin in the ‘80s. But while we were in the field, we uncovered a disturbing pattern of murders with similarities to Rhys’ that were just too blatant to ignore. So, we spent the next three years working with local and federal law enforcement …
…
continue reading

1
Most Wanted Dark Web Hackers. Truth about Scattered Spider.
47:36
47:36
Na później
Na później
Listy
Polub
Polubione
47:36🚨 New episode 🚨 David Mauro exposes The COM, Scattered Spider and BLACK CAT ransomware gang. Covering topics: most wanted dark web hackers, to catch a thief, truth about scattered spider, most wanted young hackers, Cyber Crime Gangs Under Cover, Exposed Secrets Of Cyber Crime Gangs, Profiling The People Who Cause Ransomware Attacks, how do hackers …
…
continue reading

1
Famous Hacker Reveals! True Ethical Hacking Stories.
49:44
49:44
Na później
Na później
Listy
Polub
Polubione
49:44🚨New Episode 🚨We’re joined in-studio by Bryan Seely— World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ. He’s also the author of Cyber Fraud: The Web of Lies! We discuss: true ethical hacking stories, data brokers and privacy risks, wiretapping…
…
continue reading