
-
Negotiate Like Life Depends on It. Chris Voss.
Cyber Crime Junkies PodcastA Don’t-miss episode with an exclusive interview with FBI hostage negotiator, Chriss Voss. Discussing how to negotiate like life depends on it. Author of “Never Split the Difference” and business negotiation expert, this Chriss Voss interview has exclusive insights on the founding of his leading interview style and negotiation methods. If you liked this, please SUBSCRIBE to our channel. Share this video with others if you enjoyed it.77 views 4 comments -
Shocking Cybercrime Secrets You Need to Know!
Cyber Crime Junkies PodcastWelcome to Cyber Crime Junkies—where cybersecurity finally meets binge-worthy storytelling. Join Our Community. Choose a PLAYLIST! Protect your personal data and online identity from cyber threats with this comprehensive guide to cybersecurity 101! In today's digital age, it's crucial to prioritize internet safety and secure browsing habits to avoid falling victim to identity theft and other malicious attacks. By adopting good cyber hygiene practices, you can significantly reduce the risk of being hacked and protect your sensitive information from prying eyes. In this video, we'll cover the essential tips and best practices to ensure your online safety and data security. From password management to safe online transactions, we've got you covered. Stay ahead of hackers and take control of your online security today! 🎧 Hit subscribe so you don’t miss the real stories behind the headlines. https://www.youtube.com/@cybercrimejunkies/featured 🔥New Special Offers! 🔥 Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data from data brokers and more. 🔥No risk.🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies 🔥AI Translation, Audio Reader & Voice Cloning Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq CHAPTERS 00:00 Welcome to Cyber Crime Junkies 00:11 Cybersecurity Made Simple 00:22 How To Break into Cybersecurity 00:33 Cybersecurity For Beginners 00:44 Cybersecurity Training For Beginners 00:55 How To Protect Yourself Online 01:16 Cyber Security Awareness 01:27 Digital Safety Tips 01:38 Cybersecurity For Non-Techies 🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! Dive Deeper: 🔗 Website: https://cybercrimejunkies.com Engage with us on Socials: ✅ LinkedIn: https://www.linkedin.com/in/daviddmauro/ 📱 X/Twitter: https://x.com/CybercrimeJunky 📸 Instagram: https://www.instagram.com/cybercrimejunkies/ Catch Audio Podcast episodes: 🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 🎙️ YouTube Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast and everywhere else there are podcasts. Don't forget to LIKE, SHARE, and SUBSCRIBE #CyberCrimeJunkies #CyberSecurity #CyberCrimeStories #Podcast #CyberAwareness571 views 8 comments -
Espionage Hackers & Spies
Cyber Crime Junkies PodcastThere is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. SEE FULL EPISODE: PART 1: https://youtu.be/4YbYqVYOdh4 PART 2: https://youtu.be/DMoOqrYYgpE Topics: inside espionage what every american should know, inside truth behind data breaches, inside the world of chinese espionage what every american should know , espionage hackers and spies, difference between breach and espionage, secret espionage behind beaches, what chinese espionage means to America, what china espionage means to America, espionage hackers and spy stories, secret espionage inside beaches, espionage stories behind american data breaches, espionage behind breaches, espionage behind american data breaches, espionage behind data breaches, real life espionage behind data breaches, chinese espionage from breaches, chinese espionage behind scenes, china espionage and what it means to America, how espionage works behind data breaches, The Threat of Chinese Espionage to American National Security How Chinese Espionage is Undermining America's Economic Power The Impact of Chinese Espionage on US Businesses and Innovation Inside Espionage: What Every American Should Know The Dangers of Chinese Espionage: A Wake-Up Call for America's Intelligence Agencies Espionage hackers and spies. Today’s Cyber Crime Junkies episode involves true stories of secret espionage behind beaches and what Chinese espionage means to America. Subscribe to our YouTube Channel for Behind-Scenes and Better Content. @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg Want more true cyber crime stories? Check out https://cybercrimejunkies.com134 views -
What Cyber Risk Really Means Today
Cyber Crime Junkies PodcastWhat Cyber Risk Really Means Today What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Ryan Leirvik who joins us in the studio. Ryan is the CEO of Neuvik & author of Understand, Manage, and Measure Cyber Risk®,Practical Solutions for Creating a Sustainable Cyber Program. Ryan has decades of experience as a Cyber Expert for McKinsey & Company and was formerly with the US Dept of Defense at the Pentagon where he served as Associate Director of Cyber and Chief of Staff. Grab your copy of Ryan’s Book: https://link.springer.com/book/10.1007/978-1-4842-9319-5 Check out Neuvik Security: https://www.neuvik.com/ Topics: what cyber risk really means today, how to pick best security guidelines to follow today, top security guidelines to use today, top security guidelines are best to use today, which security controls are best, what cisos need know to reduce effects of cyber crime, what top standards cisos need know, best security guidelines to use today, how to best understand cyber risk, how to understand cyber risk today, how businesses should understand cyber risk today, how businesses should understand cyber risk, practical understanding of cyber risk today, Subscribe to our YouTube Channel for Behind-Scenes and Better Content. It's FREE. @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg Want more true cyber crime stories? Check out Https://cybercrimejunkies.com119 views 2 comments -
Fall of a Cyber Crime Gang. Interview with Legendary Jon DiMaggio
Cyber Crime Junkies PodcastDon’t’ Miss the Epic VIDEO of this Podcast Episode: https://www.youtube.com/live/piM5OjY6x58?si=9o3G6RlPHeb90KB5 Topics: rise and fall of a cyber crime gang, betrayal in cyber crime , fall of a cyber crime gang, take down of a cyber crime gang, when a cyber crime gang implodes, when cyber crime turns on each other, when cyber crime does not pay, when cyber crime gangs fail, when cyber crime gangs betray, cyber crime fails, when cyber crime fails, Jon DiMaggio, Analyst1, LockBit, Jon DiMaggio’s latest blockbuster report Ransomware Diaries VOL 3: https://analyst1.com/ransomware-diaries-volume-3-lockbits-secrets/ Subscribe for Behind-Scenes and Better Content. It's FREE. @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg Want more true cyber crime stories? Check out Https://cybercrimejunkies.com55 views 1 comment -
How Medieval Wars Were Fought #cybercrime #podcast #cybersecurity
Cyber Crime Junkies PodcastWhat can we learn from some of the largest breaches in the news? Don’t Miss The Full Episode! https://youtu.be/uQFI3fiPSEM Ryan Leirvik who joins us in the studio. Ryan is the CEO of Neuvik & author of Understand, Manage, and Measure Cyber Risk Ryan has decades of experience as a Cyber Expert for McKinsey & Company and was formerly with the US Dept of Defense at the Pentagon where he served as Associate Director of Cyber and Chief of Staff. Grab your copy of Ryan’s Book: https://link.springer.com/book/10.1007/978-1-4842-9319-5 Check out Neuvik Security: https://www.neuvik.com/ Topics: how medieval wars were fought, what cyber risk really means today, how to pick best security guidelines to follow today, top security guidelines to use today, top security guidelines are best to use today, which security controls are best, what cisos need know to reduce effects of cyber crime, what top standards cisos need know, best security guidelines to use today, how to best understand cyber risk, how to understand cyber risk today, how businesses should understand cyber risk today, how businesses should understand cyber risk, practical understanding of cyber risk today, Subscribe to our YouTube Channel for Behind-Scenes and Better Content. It's FREE. @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg Want more true cyber crime stories? Check out Https://cybercrimejunkies.com41 views -
Dangers of Swatting Online-Law Enforcement Takes Aim
Cyber Crime Junkies PodcastAfter hundreds of schools across the country became swatting victims this past spring, legislators, law enforcement and tech companies said they would find new ways to address it. According to Recorded Future News: The FBI has created a national repository for local law enforcement to voluntarily report swatting incidents. However, it's deemed only a first step in tackling this form of cyber crime. Swatting requires a multi-pronged solution and the legislation to tackle this issue is currently insufficient, requiring patchwork of statutes to prosecute offenders. This highlights a need for a more robust form of legislation at a federal level. Several states like Washington, Texas, and Maryland have strong anti-swatting legislation, setting a good model for federal level law. Yet, the heterogeneity across state laws demand for federal protection to ensure uniformity in victims' recourse and defenses. Follow us to learn more at Cyber Crime Junkies Https://cybercrimejunkies.com21 views -
Great AI Learning Resources. Free! #podcast #cybercrime #business #ai
Cyber Crime Junkies PodcastTopics: Great AI Learning Resources. Free!,artificial intelligence robot, artificial intelligence news, best ai learning resources, artificial intelligence tutorial, machine learning projects, artificial intelligence trailer, machine learning street talk, machine learning explained, machine learning course, artificial intelligence, new ai learning resources, new ai trends Let's stand against cybercrime together - subscribe to our YouTube Channel for behind-the-scenes look and be part of the conversation for FREE: @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg For more captivating and real cybercrime stories, visit our website at https://cybercrimejunkies.com. Continue exploring the fascinating yet terrifying world of cybercrime, learning how to take steps to secure yourself.24 views -
When Cyber Crime Gangs Get Breached #podcast #cybercrimeexpert #business #cybercrime
Cyber Crime Junkies PodcastDon’t’ Miss the Epic VIDEO of this Podcast Episode: https://www.youtube.com/live/piM5OjY6x58?si=9o3G6RlPHeb90KB5 Topics: rise and fall of a cyber crime gang, betrayal in cyber crime , fall of a cyber crime gang, take down of a cyber crime gang, when a cyber crime gang implodes, when cyber crime turns on each other, when cyber crime does not pay, when cyber crime gangs get breached, how cyber crime gangs hack each other, when cyber crime gangs hack each other, why cyber crime gangs hack each other, cyber crime gangs turn on each other, betrayal of a cyber crime gang, when notorious cyber crime gangs fail, when cyber crime gangs fail, when cyber crime gangs betray, cyber crime fails, when cyber crime fails, Jon DiMaggio, Analyst1, LockBit, Jon DiMaggio’s latest blockbuster report Ransomware Diaries VOL 3: https://analyst1.com/ransomware-diaries-volume-3-lockbits-secrets/ Subscribe for Behind-Scenes and Better Content. It's FREE. @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg Want more true cyber crime stories? Check out Https://cybercrimejunkies.com360 views -
When a cyber crime gang implodes. #podcast #cybercrime #business #cybercrimeexpert
Cyber Crime Junkies PodcastDon’t’ Miss the Epic VIDEO of this Podcast Episode: https://www.youtube.com/live/piM5OjY6x58?si=9o3G6RlPHeb90KB5 Topics: rise and fall of a cyber crime gang, betrayal in cyber crime , fall of a cyber crime gang, take down of a cyber crime gang, when a cyber crime gang implodes, when cyber crime turns on each other, when cyber crime does not pay, when cyber crime gangs get breached, how cyber crime gangs hack each other, when cyber crime gangs hack each other, why cyber crime gangs hack each other, cyber crime gangs turn on each other, betrayal of a cyber crime gang, when notorious cyber crime gangs fail, when cyber crime gangs fail, when cyber crime gangs betray, cyber crime fails, when cyber crime fails, Jon DiMaggio, Analyst1, LockBit, Jon DiMaggio’s latest blockbuster report Ransomware Diaries VOL 3: https://analyst1.com/ransomware-diaries-volume-3-lockbits-secrets/ Subscribe for Behind-Scenes and Better Content. It's FREE. @Cybercrimejunkiespodcast https://www.youtube.com/channel/UCNrU8kX3b4M8ZiQ-GW7Z1yg Want more true cyber crime stories? Check out Https://cybercrimejunkies.com354 views