Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're ...
…
continue reading
Deep dive into true crime… where real life can be stranger than fiction! Let me know if there’s any cases you’d like to hear about! You can reach me at [email protected]
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Hey there, Tax Crime Junkies! For those of you who are new to our show, Tax Crime Junkies is the true crime podcast that combines our love of taxes and crime, and we’re here to bring you the inside scoop on some of the most fascinating tax-related cases out there. As tax experts and practitioners ourselves, Dom and Tom are uniquely qualified to uncover the most intricate details of these cases, and we’re not afraid to go deep. We know the ins and outs of the tax system, and we’re passionate ...
…
continue reading
A deep-dive into Netflix's Abducted in Plain Sight Cover art photo provided by David von Diemar on Unsplash: https://unsplash.com/@davidvondiemar
…
continue reading

1
SERIAL KILLER: The Doodler
49:33
49:33
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
49:33In the 1970s, few places on earth were more queer-friendly than San Francisco. But it wasn’t all drag queens and rainbows in the City by the Bay, and when the bodies of gay men started turning up one after another, fear spread like wildfire, and it got harder and harder to distinguish rumor from fact. If you have any information about murders conne…
…
continue reading

1
🔥 Truth About FYRE Festival🔥 How Online Fraud Works
32:32
32:32
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
32:32We delve into the infamous Fyre Festival, exploring the truth about fyre festival and how online fraud works. The Fyre Festival became a symbol of , how online fraudsters work. We discuss the extravagant promises made by the organizers, the disastrous execution of the event, and the legal consequences faced by its founder, Billy McFarland. Takeaway…
…
continue reading

1
Unlocking Unity: The Power of Civil Discourse and Protecting Online Privacy in America
1:00:28
1:00:28
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:00:28Kurt Long, founder and CEO of a privacy-based messaging app BUNKR (https://www.bunkr.life/) join David Mauro to discuss: how civil discourse helps our country, Newest Ways To Take Control Over Data Privacy, and why protecting online privacy is important. Summary The conversation explores the topics of data privacy, government surveillance, and unde…
…
continue reading

1
RANSOMWARE 🎯 What You Need to Know 🎯
45:48
45:48
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
45:48Host David Mauro interviews Jon DiMaggio, a well-respected cybercrime investigator, delving into the operations of LockBit, once the Top ransomware gang and now a Cyber Crime Gang Exposed. We discuss the Ransomware Take Down of #Lockbit, and how Jon’s research led to cyber criminals exposed on #cybercrimejunkies. #lockbit #ransomware #cybercrime Do…
…
continue reading

1
Cyber Risk Unleashed. Latest Threats To Business.
53:05
53:05
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
53:05Elizabeth Houser, Director of Cyber defense at Defense Storm, discusses her role in cybersecurity and her creation of the Security Intel Bulletin. We discuss what cyber risk means for business leaders today. She emphasizes the importance of translating cybersecurity topics into plain language to increase awareness and understanding among business l…
…
continue reading

1
Cybercrime vs Small Business. Insider View of Cyber Crime.
49:17
49:17
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
49:17Ron Sharon, a well-known cybersecurity & IT leader having served at such great companies as CANNON, LA Clippers, Universal Music, Mercedes, and more. Ron is a mentor to IT and cyber professionals across the globe and a friend of this show. Chapters 00:00 The Journey into Cybersecurity 04:58 Cyber Crime vs Small Business 09:56 Insider View of Cyber …
…
continue reading

1
MURDERED: Kala Williams & Heather Higgins
48:47
48:47
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
48:47Kala Williams was 20 years old when her family stopped hearing from her. Weeks later, her body was discovered dismembered in the woods with the DNA of a possible suspect on her body and items from the crime scene. Yet, the DNA evidence hasn’t been enough to charge him in Kala’s case - or the disappearance of another Spokane woman two years prior. I…
…
continue reading

1
Cyber Traps at Home! How to Keep Your Family Safe Online.🔥
54:23
54:23
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
54:23Host David Mauro interviews Dr. Feleks Kravetz, US citizen who migrated from the former USSR and founder of Cuber Security Easy. We discuss: 🎯protecting yourself online, 🎯cybersecurity risks for families, and 🎯the importance of cybersecurity awareness. Find Dr. Felix and his mission to raise awareness for all here: 🌐 Website: https://www.CyberSecur…
…
continue reading

1
Barry Minkow: King of the Con
32:05
32:05
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
32:05He was a teenage millionaire. A carpet-cleaning king. A Wall Street darling. Then, a convict. Then, a pastor. Then… a convict again. In this jaw-dropping episode of Tax Crime Junkies, Dom and Tom unravel the unbelievable story of Barry Minkow, a man whose life has more plot twists than a Hollywood thriller (ironically, there is a Hollywood movie ab…
…
continue reading
Nic Monroe is in a rut. At twenty-four, she lives alone in a dinky apartment in her hometown of Mishawaka, Indiana, she’s just gotten a DWI, and she works the same dead-end job she’s been working since high school, a job she only has because her boss is a family friend and feels sorry for her. Everyone has felt sorry for her for the last seven year…
…
continue reading

1
SURVIVED: Fallon Farinacci
50:50
50:50
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
50:50In honor of May being National Missing and Murdered Indigenous Persons Awareness Month, Brit sits down with Red River Métis woman and survivor Fallon Farinacci to hear her story—and how a series of tragic events set her on a path toward tremendous advocacy and change for her community. Fallon’s Celebrate Indigenous Resilience GoFundMe can be viewed…
…
continue reading

1
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
51:25
51:25
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
51:25Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses id…
…
continue reading

1
How Hackers Think.🔥Chris Roberts🔥Latest AI Risks for Business
58:38
58:38
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
58:38Rural Healthcare and small/midsized businesses are being tipped over the edge. Not by Tariffs or high interest rates, but by investments needed into protecting their people and systems from disruption. How can you protect yourself from something you don’t know? A risk you don’t understand. What if you could think like a hacker… and use that power t…
…
continue reading

1
The Fine Line Files: Too Good to Be True – How to Spot a Scam Before It Spots You
15:09
15:09
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
15:09Episode Summary: After the rise and fall of San Diego real estate mogul Gina Champion-Cain—and her infamous $400 million Ponzi scheme—Dom is back with a solo deep dive into how these schemes actually work and, more importantly, how you can protect yourself from becoming the next victim. From fake escrow officers (looking at you, Wendy Reynolds) to …
…
continue reading

1
INFAMOUS: The Westside Park Murders
47:15
47:15
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
47:15In September of 1985, two teenagers drove into Westside Park but, tragically, never left the park alive. The police have spent decades trying to hunt down their killer. If you know anything about the murders of Ethan Dixon and Kimberly Dowell, please contact the Muncie police department at 765-747-4867. You can also contact them anonymously through…
…
continue reading

1
Are you at Risk? Personal Liability Cyber Breaches.
54:33
54:33
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
54:33We interview Joseph Brunsman of the Brunsman Group, a thought leader in cybersecurity insurance. They discuss the liability in data breaches and the changes happening in the cybersecurity insurance industry. They also explore the impact of AI on cyber insurance and the importance of accurate application and underwriting processes. The conversation …
…
continue reading
📲 Got a DM from the “FBI” on Telegram? 🚨 Did someone named “Jaimie Quin” claim they run IC3? ⚠️ It’s a scam. Full stop. The FBI just issued an alert warning the public: They are NOT direct messaging victims on Telegram or any other social media app. A scammer posing as “Jaimie Quin” is pretending to be the head of the FBI’s Internet Crime Complaint…
…
continue reading

1
Cyber Crime-Biggest Threat to Critical Infrastructure. Unmasking Top Cyber Threats Today To US Critical Infrastructure
1:36:41
1:36:41
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:36:41Panel discussion with international leaders part of the Silicon Valley Think Tank, Tortora Brayda AI & Cyber Institute Task Force. Find out and join the Think Tank: https://www.tortorabrayda.org/home Chapters 00:00 Introduction to the Challenges of Securing Critical Infrastructure 03:11 Vulnerabilities and Weaknesses in Critical Infrastructure 10:0…
…
continue reading
👀 Could your next Google search lead you into a cyber trap? 🔐 Are you sure that “HR login” link isn’t a fake? 🚨 The FBI just issued a Public Service Announcement warning EVERYONE — yes, even you — that cybercriminals are now targeting employee self-service websites (like payroll, benefits, and HR portals). Here’s how it works: ⚠️ Fraudsters buy sea…
…
continue reading
📬 Would you fall for a fake Google subpoena? 🛡️ What if it passed every security check — and looked 100% real? 🚨 A new phishing tactic is slipping past traditional defenses — and it’s terrifyingly convincing. 🕵️♂️ Recent reports reveal cybercriminals are sending fake emails that mimic legal subpoenas from Google. ✅ No misspellings ✅ No suspicious …
…
continue reading

1
Zero Trust, SMB & National Security. INTEL CTO Exclusive.
1:01:40
1:01:40
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:01:40Don't miss the video interview for details: https://youtu.be/-G7hbLGDK9o Steve Orrin, Federal CTO for Intel, discusses secrets inside zero trust and r latest cyber security concerns. He is a recognized security leader and public speaker. Steve has orchestrated projects for federal government agencies on Security and AI. Steve is a key advisor in em…
…
continue reading

1
Secrets To Cyber Crime Discussions. Ransomware Negotiations Unleashed.
58:15
58:15
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
58:15David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercri…
…
continue reading

1
The Girlboss of Ponzi Schemes Gina Champion Cane
41:00
41:00
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
41:00In this gripping episode of Tax Crime Junkies, we dive deep into the rise and fall of Gina Champion-Cain, a woman who once enjoyed the high life of San Diego’s real estate elite—until she became the mastermind behind one of the most infamous Ponzi schemes in history. Gina Champion-Cain, self-proclaimed “nice Catholic girl from Michigan,” made a nam…
…
continue reading

1
MURDERED: Solomon Robinson
39:01
39:01
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
39:01A young soldier, home on leave, should have been safe in his own neighborhood. Instead, 19-year-old Solomon Robinson was murdered in a park full of people — but no one has ever come forward to say what really happened. Decades later, his family is still searching for justice, and detectives are hoping someone will finally break the silence. The FBI…
…
continue reading

1
How start a career in cybersecurity today. Josh Mason
56:21
56:21
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
56:21Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today,…
…
continue reading

1
Zero Trust. Social Engineering. Ron Woerner.
44:18
44:18
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
44:18Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Ha…
…
continue reading

1
Oracle Breach 2025 🎯 How Hackers Attack
35:53
35:53
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
35:53In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents high…
…
continue reading