Crime Junkie 공개
[search 0]
Download the App!
show episodes
 
Artwork

1
Crime Junkie

audiochuck

icon
Unsubscribe
icon
Unsubscribe
주마다+
 
Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're ...
  continue reading
 
Artwork

1
True Crime Junkie

The Who, The What, The Why

icon
Unsubscribe
icon
Unsubscribe
매달
 
Deep dive into true crime… where real life can be stranger than fiction! Let me know if there’s any cases you’d like to hear about! You can reach me at TrueCrimeJunkie01@gmail.com
  continue reading
 
Artwork

1
Tax Crime Junkies

Dominique Molina

icon
Unsubscribe
icon
Unsubscribe
매달+
 
Hey there, Tax Crime Junkies! For those of you who are new to our show, Tax Crime Junkies is the true crime podcast that combines our love of taxes and crime, and we’re here to bring you the inside scoop on some of the most fascinating tax-related cases out there. As tax experts and practitioners ourselves, Dom and Tom are uniquely qualified to uncover the most intricate details of these cases, and we’re not afraid to go deep. We know the ins and outs of the tax system, and we’re passionate ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
Unsubscribe
주마다+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Loading …
show series
 
In 2003, construction workers in Hell’s Kitchen, New York, discovered a concrete tomb hidden in the basement of a run-down building. Inside were the remains of a young woman, hogtied with pantyhose and electrical cords, this gruesome scene was more than shocking—it was deeply calculated. It took more than two decades for investigators to identify h…
  continue reading
 
This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency Ponzi scheme in history. Three main players, Ruja Ignatova (The Crypto Queen), her brother Konstantin and Sebastian Greenwood (the public face of ONECO…
  continue reading
 
🔥 Stay with us as we explore The SONY hack-decoded and take you Behind Scenes with a Real Hacker. In this episode we go Behind Scenes with A Real Hacker where Cyber Crime Junkies, host David Mauro, interviews Cody Kretsinger, a former Lulzsec member, exploring the Sony Hack Decoded. Guest Cody Kretsinger shows us how hacktivists help keep businesse…
  continue reading
 
Expert Ayelet Biger of Scam Rangers joins us for Shocking Fraud Attempts To Watch Out For and even more shocking ways to protect personal data and best practices fraud protection. We address newest stories on account take overs and discussed how to protect families online, how can we spot fraud in business, how to protect employees online, how to p…
  continue reading
 
The Fine Line Files: Life Insurance and Fraud – When Death Becomes ProfitableEpisode Summary: Life insurance is meant to provide financial security for loved ones after a loss. But what happens when a policy becomes a motive for crime? In this episode of The Fine Line Files, we explore the dark world of life insurance fraud—from suspicious claims t…
  continue reading
 
Gabriel Friedlander, founder of Wizer Security, join us. Founded in 2019 and now in over 20k organizations across 50 countries, including the great local city of Indianapolis Indiana in heartland of the US Wizer training demonstrates how to build a security culture and believes today security awareness should be a basic life skill. Topics: how to b…
  continue reading
 
Summary This episode explores the true cybercrime story of Michael Calce, also known as Mafia Boy, who was responsible for taking down major websites like Yahoo, E-Trade, eBay, and more during the dot com bubble. Michael's journey into hacking began when he received his first computer at the age of six and became fascinated with the idea of control…
  continue reading
 
Story of A dead or missing CEO, Gerald Cotten, CEO of Quadriga CX, the largest Exchange in Canada. Topics: missing ceo dead or alive, the ultimate exit scam, exit scams explained, faking death for cyber crime, exist scams for cyber crime, exist scams explained, why people fake their death, how people change identity, why people change identity, exi…
  continue reading
 
Doug Grant: Vitamins and Visions Episode Summary: In this episode of Tax Crime Junkies, we unravel the case of Doug Grant—a once-prominent nutritionist and supplement mogul who built a thriving business advising top-tier athletes, including the Phoenix Suns and Arizona Diamondbacks. But beyond the world of vitamins and fitness, Grant’s life took a …
  continue reading
 
Best ways to keep up to date on security news. Latest Cyber Crimes. So many cybercrimes and so little time. Every week we get inundated with news affects our personal and professional lives. How do we stay current? Is there meaning or context behind the news story? Which ones are top-of-mind? We explore some of the very latest cybercrime and securi…
  continue reading
 
In the summer of 1966, three young women head to the beaches of Lake Michigan and are never seen again, setting off a mystery that remains unsolved to this day. If you have any information about the disappearances of Patricia Blough, Ann Miller, and Renee Bruhl, please contact the Indiana State Police tip line at 317-232-8248, or the Westchester Po…
  continue reading
 
🔥 New Episode Alert! 🔥 A powerful conversation, David Mauro teams up with former Intel Security Executive and experienced CISO, Matthew Rosenquist, to break down the ai risks to small business. Discover AI in social engineering, importance of communication in security, and business communication in cyber security, making businesses more vulnerable …
  continue reading
 
Crypto News, Cyber flash point about self-proclaimed Bitcoin killer, OneCoin. rise and fall of crypto star FBI most wanted, Ruja Ignatova. To Submit a TIP and Potentially collect the new $5 Million Reward, you can submit a tip online at www.tips.FBI.gov Or Call 1-800-CALL-FBI The rise and fall of ONE COIN and the hunt for Ruja Ignatova is a story o…
  continue reading
 
Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch a Phish nick@thenetdefender.com h…
  continue reading
 
On Christmas Eve in 1991, Dana Ireland is found tucked away in a secluded, hard to get to area of the Hawaiian subdivision Vacationland, barely clinging to life. When she finally arrives at a Hilo hospital, the damage is too severe and they declare Dana dead at 12:25am on Christmas morning. In 2023, the audiochuck team set out to tell you the story…
  continue reading
 
Episode Summary: In this episode of The Fine Line Files, we pull back the curtain on the art of deception used by financial fraudsters to create the illusion of success. From lavish lifestyles to fake business ventures, scammers have long understood that the key to credibility is looking the part. But how do they pull it off? And more importantly—h…
  continue reading
 
When what should have been a carefree date goes horribly wrong, the city of Houston realizes there’s a monster in their midst. Will they be caught in time? If you have any information about the murders of Cheryl Henry & Andy Atkinson in Houston in 1990, please call the Houston Crime Stoppers tip line at 713-222-TIPS (8477). In honor of Andy & Chery…
  continue reading
 
🔥🚨NEW EPISODE 🔥🚨We delve into the Latest AI Threats To Small Business. Exposing AI Hiring Fraud! Watch to the end to see live examples of how this is happening today. Topics covered: 🔥AI Fraud in Interviews, 🔥How AI Scams Effect Business, 🔥AI Fraud In Job Interviews takeaways AI-driven fraud is a growing concern for businesses. Many resumes are now…
  continue reading
 
Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Ha…
  continue reading
 
After years in the industry, inventing and exploring emerging technologies, Gideon Hazam, Co-Founder, COO and CSM at Memcyco, https://www.memcyco.com/home found a way to solve a problem outside the normal cybersecurity approaches. He joins us behind the scenes to discuss innovative ways to reduce website spoofing. Key Topics: new ways to reduce cyb…
  continue reading
 
Rob Black, a security educator and Fractional CISO, joins us to discuss the best ways for quantifying cyber security and why it is crucial for small and medium-sized business owners. David Mauro interviews Rob Black, the founder of Fractional CISO, about his journey in the cybersecurity industry and the challenges faced by medium-sized businesses. …
  continue reading
 
Is Ransomware Dead? Jon DiMaggio, Author of The Art of Cyber Warfare and Chief Security Researcher at Analyst 1, joins us, in this second of a two-part discussion. Here we discuss: how cyber crime is shifting gears exclusive look inside their shocking new tactics insight from the mouths of top cyber crime gang leaders. We bring you Inside the Corpo…
  continue reading
 
The discovery of 19-year-old Helen Betty Osborne’s body should have outraged the residents of The Pas, Manitoba. Yet, the truth of what happened to her, and who killed her, would remain an open secret for years. But, like all secrets, what happened that night eventually came to light – and upended over a decade of sinister silence. There is a memor…
  continue reading
 
When technology can do everything for us, what is left? Imagination. That is the intrigue in a soon-to-be-released book coming by Dr Lydia Kostopoulos, who holds a PHD in International Relations, Security and Political Science, having attended the Harvard Kennedy school for Cybersecurity. We discuss: Harnessing Emerging Tech: Imagination and AI in …
  continue reading
 
Video Episode: https://youtu.be/oH7FpvHOhVA This is the story of Matt Smallman, author of “Unlocking Your Call Centre”, about how call centers can be security risks. Our discussion gives exclusive insight into how biometrics fail in security, problems with voice authentication and explore military tactics and biometrics. We explore how to balance c…
  continue reading
 
Quantum AI: What You Need to Know NOW! 🚨🔐 Quantum computing is revolutionizing cybersecurity—are we ready? In this Cyber Crime Junkies episode, we uncover how quantum tech could break encryption, threaten sensitive data, and reshape industries. But is it all bad? Discover the risks, the opportunities, and what businesses must do now to stay ahead. …
  continue reading
 
This is the story of Lester Chng, CISSP and the Art of How To Use War Games In Business. Topics discussed: how to use war games in business, understanding war game exercises in business, leveraging war games in business, how to use war games in security, how to use war games in cyber security, war games in cyber security, how war games are like tab…
  continue reading
 
Loading …

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생