Crime Junkie nyilvános
[search 0]
Több
Download the App!
show episodes
 
Artwork

1
Crime Junkie

audiochuck

icon
Unsubscribe
icon
Unsubscribe
Heti+
 
Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
Unsubscribe
Heti+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
Tax Crime Junkies

Dominique Molina

icon
Unsubscribe
icon
Unsubscribe
Havi+
 
Hey there, Tax Crime Junkies! For those of you who are new to our show, Tax Crime Junkies is the true crime podcast that combines our love of taxes and crime, and we’re here to bring you the inside scoop on some of the most fascinating tax-related cases out there. As tax experts and practitioners ourselves, Dom and Tom are uniquely qualified to uncover the most intricate details of these cases, and we’re not afraid to go deep. We know the ins and outs of the tax system, and we’re passionate ...
  continue reading
 
Loading …
show series
 
In the 1970s, few places on earth were more queer-friendly than San Francisco. But it wasn’t all drag queens and rainbows in the City by the Bay, and when the bodies of gay men started turning up one after another, fear spread like wildfire, and it got harder and harder to distinguish rumor from fact. If you have any information about murders conne…
  continue reading
 
We delve into the infamous Fyre Festival, exploring the truth about fyre festival and how online fraud works. The Fyre Festival became a symbol of , how online fraudsters work. We discuss the extravagant promises made by the organizers, the disastrous execution of the event, and the legal consequences faced by its founder, Billy McFarland. Takeaway…
  continue reading
 
Kurt Long, founder and CEO of a privacy-based messaging app BUNKR (https://www.bunkr.life/) join David Mauro to discuss: how civil discourse helps our country, Newest Ways To Take Control Over Data Privacy, and why protecting online privacy is important. Summary The conversation explores the topics of data privacy, government surveillance, and unde…
  continue reading
 
Host David Mauro interviews Jon DiMaggio, a well-respected cybercrime investigator, delving into the operations of LockBit, once the Top ransomware gang and now a Cyber Crime Gang Exposed. We discuss the Ransomware Take Down of #Lockbit, and how Jon’s research led to cyber criminals exposed on #cybercrimejunkies. #lockbit #ransomware #cybercrime Do…
  continue reading
 
Elizabeth Houser, Director of Cyber defense at Defense Storm, discusses her role in cybersecurity and her creation of the Security Intel Bulletin. We discuss what cyber risk means for business leaders today. She emphasizes the importance of translating cybersecurity topics into plain language to increase awareness and understanding among business l…
  continue reading
 
Ron Sharon, a well-known cybersecurity & IT leader having served at such great companies as CANNON, LA Clippers, Universal Music, Mercedes, and more. Ron is a mentor to IT and cyber professionals across the globe and a friend of this show. Chapters 00:00 The Journey into Cybersecurity 04:58 Cyber Crime vs Small Business 09:56 Insider View of Cyber …
  continue reading
 
Kala Williams was 20 years old when her family stopped hearing from her. Weeks later, her body was discovered dismembered in the woods with the DNA of a possible suspect on her body and items from the crime scene. Yet, the DNA evidence hasn’t been enough to charge him in Kala’s case - or the disappearance of another Spokane woman two years prior. I…
  continue reading
 
Host David Mauro interviews Dr. Feleks Kravetz, US citizen who migrated from the former USSR and founder of Cuber Security Easy. We discuss: 🎯protecting yourself online, 🎯cybersecurity risks for families, and 🎯the importance of cybersecurity awareness. Find Dr. Felix and his mission to raise awareness for all here: 🌐 Website: https://www.CyberSecur…
  continue reading
 
He was a teenage millionaire. A carpet-cleaning king. A Wall Street darling. Then, a convict. Then, a pastor. Then… a convict again. In this jaw-dropping episode of Tax Crime Junkies, Dom and Tom unravel the unbelievable story of Barry Minkow, a man whose life has more plot twists than a Hollywood thriller (ironically, there is a Hollywood movie ab…
  continue reading
 
Nic Monroe is in a rut. At twenty-four, she lives alone in a dinky apartment in her hometown of Mishawaka, Indiana, she’s just gotten a DWI, and she works the same dead-end job she’s been working since high school, a job she only has because her boss is a family friend and feels sorry for her. Everyone has felt sorry for her for the last seven year…
  continue reading
 
In honor of May being National Missing and Murdered Indigenous Persons Awareness Month, Brit sits down with Red River Métis woman and survivor Fallon Farinacci to hear her story—and how a series of tragic events set her on a path toward tremendous advocacy and change for her community. Fallon’s Celebrate Indigenous Resilience GoFundMe can be viewed…
  continue reading
 
Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses id…
  continue reading
 
Rural Healthcare and small/midsized businesses are being tipped over the edge. Not by Tariffs or high interest rates, but by investments needed into protecting their people and systems from disruption. How can you protect yourself from something you don’t know? A risk you don’t understand. What if you could think like a hacker… and use that power t…
  continue reading
 
Episode Summary: After the rise and fall of San Diego real estate mogul Gina Champion-Cain—and her infamous $400 million Ponzi scheme—Dom is back with a solo deep dive into how these schemes actually work and, more importantly, how you can protect yourself from becoming the next victim. From fake escrow officers (looking at you, Wendy Reynolds) to …
  continue reading
 
In September of 1985, two teenagers drove into Westside Park but, tragically, never left the park alive. The police have spent decades trying to hunt down their killer. If you know anything about the murders of Ethan Dixon and Kimberly Dowell, please contact the Muncie police department at 765-747-4867. You can also contact them anonymously through…
  continue reading
 
We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation …
  continue reading
 
📲 Got a DM from the “FBI” on Telegram? 🚨 Did someone named “Jaimie Quin” claim they run IC3? ⚠️ It’s a scam. Full stop. The FBI just issued an alert warning the public: They are NOT direct messaging victims on Telegram or any other social media app. A scammer posing as “Jaimie Quin” is pretending to be the head of the FBI’s Internet Crime Complaint…
  continue reading
 
Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:0…
  continue reading
 
👀 Could your next Google search lead you into a cyber trap? 🔐 Are you sure that “HR login” link isn’t a fake? 🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Here’s how it works: ⚠️ Fraudsters buy sea…
  continue reading
 
📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing. 🕵️‍♂️ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google. ✅ No misspellings ✅ No suspicious …
  continue reading
 
Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in em…
  continue reading
 
David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercri…
  continue reading
 
In this gripping episode of Tax Crime Junkies, we dive deep into the rise and fall of Gina Champion-Cain, a woman who once enjoyed the high life of San Diego’s real estate elite—until she became the mastermind behind one of the most infamous Ponzi schemes in history. Gina Champion-Cain, self-proclaimed “nice Catholic girl from Michigan,” made a nam…
  continue reading
 
A young soldier, home on leave, should have been safe in his own neighborhood. Instead, 19-year-old Solomon Robinson was murdered in a park full of people — but no one has ever come forward to say what really happened. Decades later, his family is still searching for justice, and detectives are hoping someone will finally break the silence. The FBI…
  continue reading
 
Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today,…
  continue reading
 
Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Ha…
  continue reading
 
In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents high…
  continue reading
 
Loading …

Gyors referencia kézikönyv

Hallgassa ezt a műsort, miközben felfedezi
Lejátszás