Podcasts about computer misuse act

  • 14PODCASTS
  • 15EPISODES
  • 25mAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 12, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about computer misuse act

Latest podcast episodes about computer misuse act

Cybercrime Magazine Podcast
Talking Cyber. UK Youth Engaging In Cybercrime. Heather Engel, Strategic Cyber Partners.

Cybercrime Magazine Podcast

Play Episode Listen Later Mar 12, 2024 5:19


Talking Cyber is a Cybercrime Magazine podcast series that covers the latest news and breaking stories on the cybereconomy, hackers, intrusions, privacy, security and much more. In this episode, host Amanda Glassner is joined by Heather Engel, Managing Partner at Strategic Cyber Partners, to discuss a new report revealing that one in five children aged 10-16 in the UK have engaged in online activities that violate the Computer Misuse Act. To learn more about today's stories, visit https://cybercrimewire.com • For more on cybersecurity, visit us at https://cybersecurityventures.com

Financial Crime Weekly Podcast
Financial Crime Weekly Episode 45

Financial Crime Weekly Podcast

Play Episode Listen Later Feb 12, 2023 17:42


Hello, and welcome to this week in financial crime. I'm your host, Chris Kirkbride. A good deal spinning around the world of financial crime this week. There has been a slight up-tick in activity on sanctions, including enforcement against some of those allegedly aiding sanctioned individuals. There is also some significant fraud news, and the FCA in the UK has been active in taking enforcement action this week. And, as we've started to do, there is a round-up of the mass of cyber news making the headlines this week, so let's make a start.These are the links to the principal documents mentioned in the podcast: Financial Conduct Authority, FCA calls on victims of Richard Faithfull to come forward ahead of confiscation hearing.Financial Conduct Authority, FCA starts court process to recover money for investors.Financial Conduct Authority, Cryptoasset firms marketing to UK consumers must get ready for financial promotions regime.Financial Conduct Authority, Campbell & Associates Independent Financial Advice Ltd (First Supervisory Notice).Microsoft blog post, Iran responsible for Charlie Hebdo attacks.Payment Systems Regulator, PSR sets out proposed plans for the reporting of Authorised Push Payment scams (press release).Payment Systems Regulator, CP23/1: APP scams data publishing guidance (consultation paper).The Wolfsberg Group, Publication of the CBDDQ, FCCQ, Guidance, Glossary and FAQs (press release).The Wolfsberg Group, Correspondent Banking Due Diligence Questionnaire (CBDDQ) (version 1.2), Financial Crime Compliance Questionnaire (FCCQ), and updated supporting Guidance, Glossary and FAQs.UK government, New sanctions target Putin's war machine and financial networks as UK accelerates economic pressure on Russia (press release).UK government, Financial Sanctions, Global Anti-Corruption (updated list).UK government (Home Office), Review of the Computer Misuse Act 1990: consultation and response to call for information.UK government (HM Treasury), Government approach to cryptoasset financial promotions regulation policy statement.UK government (HM Treasury), UK Sanctions List Publication (updated 09/02/2023).UK government, HM Treasury Office of Financial Sanctions Implementation, Ransomware and Sanctions Guidance on Ransomware and Financial Sanctions.UK government, Webpage linking all issued guidance on Financial Sanctions.UK government (Department for Digital, Culture, Media and Sport), Call for views on software resilience and security for businesses and organisations.US Department of the Treasury, Remarks by Under Secretary for International Affairs Jay Shambaugh at Afore Consulting's 7th Annual FinTech and Regulation Conference.US Department of the Treasury, United States and United Kingdom Sanction Members of Russia-Based Trickbot Cybercrime Gang.US Department of the Treasury, Treasury Sanctions Companies Involved in Production, Sale, and Shipment of Iranian Petrochemicals and Petroleum.US Department of Justice, Associate of Sanctioned Oligarch Indicted for Sanctions Evasion and Money Laundering.US Department of Justice, Nearly 40,000 Victims Receive Over $115M in Compensation for Fraud Schemes Processed by MoneyGram.

RX RADIO - The Fatboy Show
Fatboy & Olive: Computer Misuse Amendment Act is the Death of Journalism

RX RADIO - The Fatboy Show

Play Episode Listen Later Oct 17, 2022 11:52


President Museveni last week assented to the controversial Computer Misuse Act that many have called a big blow to free speech, a right ingrained in the country's Constitution.

Sophos Podcasts
S3 Ep98: The LastPass saga - should we stop using password managers?

Sophos Podcasts

Play Episode Listen Later Sep 1, 2022 22:15


The Computer Misuse Act, back in 1990. JavaScript supply-chain bug hunting. Jumping airgaps. "The Sanitizer" comes to Chrome. LastPass breach provokes password manager puzzlement. Original music by Edith Mudge Got questions/suggestions/stories to share? Email tips@sophos.com Twitter @NakedSecurity Instagram @NakedSecurity

Cybercrimeology
Cybercrime Frenzy: Cloudy Data and the cascade Effect

Cybercrimeology

Play Episode Listen Later Feb 15, 2022 31:05


About our GuestsDr Maria Grazia Porcedda https://www.tcd.ie/research/profiles/?profile=mariagrpDr. Joshua Jameshttps://dfir.science/Papers or resources mentioned in this article:Porcedda, M. G., & Wall, D. S. (2021, September). Modelling the Cybercrime Cascade Effect in Data Crime. In 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 161-177). IEEE.http://www.tara.tcd.ie/bitstream/handle/2262/97548/2021_Modelling_the_Cybercrime_Cascade_Effect_in_Data_Crime.pdfThe Cambridge Computer Crime Database (Maintained by Alice Hutchings )https://www.cl.cam.ac.uk/~ah793/cccd.htmlThe Computer Evidence Database of Computer Misuse Act cases (Maintained by Michael Turner)https://www.computerevidence.co.uk/Cases/CMA.htm Other:During the outro I managed to say "Mater data" instead of "Meta data". I don't think that mater data exists as a term but perhaps we will need it or something like it to describe the data that gave birth to other data.  If we keep having to chase data back to its point of origin and it is being transformed and transferred by automatic processes we might well one day have deliberate conversations about mater data.  That hasn't happened yet and in this case it was just another of  my many mangled mispronunciations.   

Ladies Hacking Society (LHS)
Talking Threats with the North East Regional Cyber Crime Unit - part I

Ladies Hacking Society (LHS)

Play Episode Listen Later Aug 17, 2021 56:38


Northumbria Police's Claire Vandenbroecke and Charlotte Knill from the Force's Cyber Crime Unit have joined the North East LHS Team for a triple treat! We met Claire at the NELHS Ade Lovelace day and we wanted to invite the Nercuu back to tell us more about what they do. Claire and Charlotte usually deliver bespoke training to businesses, advising them on how to keep their systems secure, as well as working with young people with highly specialised digital skills and they've joined NELHS in a special three-part podcast to share their expertise. The series covers everything from why you should be using two-factor authentication on your apps, to how tricks and jokes adopted by gamers could see them falling foul of the law. Charlotte said: “CyberCrime is an area of policing which is constantly evolving and changing and it is on us as a Force to adapt and make sure our staff and officers have the relevant skills to deal with offences such as ransomware attacks and hacks to phishing scams and frauds as well as sexual offences like online exploitation. “Cybercrime is ultimately something we can't arrest our way out of, even if we had all the resources in the world. The best way we can tackle cybercrime is to prevent the offences from taking place in the first instance. “A large part of my role is working with young people and getting them to understand that cybercrime is not a victimless crime – an attack on a small business for example could be devastating and have serious consequences for the owner's livelihood. “Steering teenagers away from cybercrime and showing them the vast array of jobs in the industry is a simple but effective way of preventing them using their skills in an unethical and teaching them about the Computer Misuse Act. In Claire's world of Cyber Protect and Prepare, businesses, organisations and charities are being issued with practical advice to block unsolicited attempts to gain access. “A lot of what I cover in the podcast is what I'm sharing with businesses on a daily basis. They're really simple and straightforward tips from making sure your passwords are strong – we advise using three random words or a password generator which you can find online, to use two-factor authentication for your apps, as well as basic house-keeping like ensuring all your systems are up to date so no weaknesses can be exploited.” Follow Northumbria Police Northumbria Police | Facebook and @northumbriapol on Twitter For help and advice about cybercrime visit the North East Regional Cyber Crime Unit's website here: https://nerccu.police.uk/ To check your online security visit: https://haveibeenpwned.com/ How strong is your password - https://www.security.org/how-secure-is-my-password/ Cyber Essentials - https://www.ncsc.gov.uk/cyberessentials/overview Police cyber alarm - https://cyberalarm.police.uk/ Microsoft Hafnium: https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/ The Ladies Hacking Society is here to support women in learning and expanding their technical cyber security skills. We are women focused, not women exclusive and welcome all to our community. Twitter: https://twitter.com/NorthEastLHS @LHS_LON

force threats northeast cybercrime steering east regional northumbria police cyber essentials computer misuse act
Business of Tech
Thu May 13 2021: Pipeline fallout leading to disclosure laws, and patch management guidance changes

Business of Tech

Play Episode Listen Later May 13, 2021 5:41


Two things to know today Colonial Pipeline fallout becomes clear https://www.nbcnews.com/tech/security/colonial-announces-pipeline-restart-says-normal-service-will-take-seve-rcna917 https://www.cnbc.com/2021/05/12/mark-warner-colonial-pipeline-mandatory-reporting.html https://www.msspalert.com/cybersecurity-markets/americas/president-biden-executive-order/?utm_medium=email&utm_source=sendpress&utm_campaign https://www.bloomberg.com/news/articles/2021-05-13/colonial-pipeline-paid-hackers-nearly-5-million-in-ransom AND What the UK’s cyber experts are saying, and why everyone should care. https://www.reuters.com/technology/uk-unveils-law-fine-social-media-firms-which-fail-remove-online-abuse-2021-05-11/ https://www.computerweekly.com/news/252500572/Government-to-reform-Computer-Misuse-Act https://www.computerweekly.com/news/252500582/NCSC-cyber-guidance-targets-cloud-and-home-working https://www.computerweekly.com/news/252500588/UK-Plc-invited-to-sign-up-for-Early-Warning-of-cyber-incidents https://techcrunch.com/2021/05/12/uk-publishes-draft-online-safety-bill/     Want to get the show on your podcast app, or get the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/   Support the show on Patreon:  https://patreon.com/mspradio/   Want our stuff?  Cool Merch?  Wear “Why Do We Care?” - Visit https://shop.spreadshirt.com/mspradio   Follow us on: Facebook: https://www.facebook.com/mspradionews/ Twitter: https://twitter.com/mspradionews/ Instagram: https://www.instagram.com/mspradio/ LinkedIn: https://www.linkedin.com/company/28908079/

The IT Pro Podcast
Coding our way out of recession

The IT Pro Podcast

Play Episode Listen Later Jul 3, 2020 29:22


It's no secret that there's a recession looming on the horizon as a result of COVID-19, and increasing numbers of people are finding themselves out of work. There may be an up-side to this seemingly bleak scenario, however: It could be the perfect environment for creating an unprecedented startup boom.As part of this discussion, we dig into the historical links between economic turbulence and startup success, how the tech tools used to deal with coronavirus can accelerate new businesses, and why the surge in demand for tech skills has made it easier than ever to start a new company.In this week's news section; the Computer Misuse Act may be starting to show its age, Matt Hancock looks to retire the humble pager, and Microsoft promises free up-skilling for all.For more information and links to everything that we've talked about in this week's episode head to https://bit.ly/ITPP-recession.

The techUK Podcast
The techUK Podcast Episode 18 - Cyber security post-COVID

The techUK Podcast

Play Episode Listen Later Jul 1, 2020 61:01


In the latest techUK podcast, our cyber team looks at the impact of COVID-19 on cyber security and developments within the industry more broadly. Featuring interviews with Rebecca Lucas and Sneha Dawda from the Royal United Services Institute (from 1:01), Kat Sommer from the NCC Group (25.02), Budgie Dhanda from the UK Cyber Security Council ( 37:40) and Sam Menter from Mace and Menter (52:09), this podcast looks at campaigns including the CyberUP campaign which aims to reform the Computer Misuse Act and the Cyber Exchange which aims to bring together companies from across the Cyber industry. Please visit www.techUK.org to learn more, and visit Cyber Exchange at https://cyberexchange.uk.net.

TripleThink
"A Hacker's Story" Q&A Session At Google's Campus London

TripleThink

Play Episode Listen Later Jun 5, 2018 52:28


Welcome to Triple Think Podcast - a Q&A session from our “Hacker’s Story” screening at Google’s Campus London, earlier this year.  On the panel we had Jake Davis, ex-Anonymous and LulzSec hacker, and now cyber security expert, and DC Andy Chapman from Met Police Cyber Prevent Team. Members of the audience ranged from young people hackers and developers including Lauri Love, human rights activist and educators as well as generalists.  The podcast has some really important discussions on pathways into legitimate hacking, plus: - How to take early intervention and how ex-offenders could be a huge use to wider society and industry - GDPR - Why the Computer Misuse Act needs to be updated - Hackers hacking hackers - Could getting the 'best hacking' trophy in school be a viable educational route? - The positive impact of National Cyber Crime Unit PREVENT team  Please note this recording has been edited for time and context.

SecuraBit
SecuraBit Episode 104: Cackalacky Goodness!

SecuraBit

Play Episode Listen Later May 18, 2012 58:19


Hosts Chris Gerling – @secbitchris Mike Bailey - @mpbailey1911 Andrew Borel – @andrew_secbit Guests Dr. Tran Emwave Professor Farnsworth News Items ANONYMOUS CLAIM: ‘WE HAVE ACCESS TO EVERY CLASSIFIED DATABASE IN THE U.S. GOVERNMENT’ http://www.theblaze.com/stories/anonymous-claim-we-have-access-to-every-classified-database-in-the-u-s-government/ Pentagon boosts contractor cybersecurity program http://thehackernews.com/2012/05/pentagon-boosts-contractor.html "The effort, known as the Defense Industrial Base ("DIB") program, is a voluntary information-sharing program in which the Department of Defense shares "unclassified indicators and related, classified contextual information" about cyber-attacks and threats with defense contractors.” “In exchange, defense contractors report known intrusions and can receive forensics analysis and damage assessments from the government after those attacks. In an optional part of the program, the DIB Enhanced Cybersecurity Services, the government shares additional classified threat and technical data with defense contractors and Internet service providers. " 17 year old Teenager arrested over TeamPoison hacking attacks http://thehackernews.com/2012/05/17-year-old-teenager-arrested-over.html "A teenage boy has been arrested on suspicion of being a member of "TeamPoison", a computer hacking group that has claimed responsibility for 1,400 offences including an attack on the phone system of Scotland Yard's counter-terrorism unit last month. These include attacks on the United Nations, the UK Anti-Terrorist Hotline, MI6 and RIM, as well as politicians including Nicolas Sarkozy and Tony Blair.” “The boy, who police suspect used the hacker nickname 'MLT' and was a spokesman for TeamPoison, was interviewed at a local police station on offences under the Computer Misuse Act on Wednesday. The arrest is part of an ongoing investigation by the Police Central e-Crime Unit (PCeU) division of the Metropolitan Police into various hacking gangs who have made headlines in the last year or so.” “TeamPoison’s highest-profile attack was mounted against Scotland Yard’s counter-terror hotline last month, has also claimed responsibility Distributed Denial of Service attacks against banks in collaboration with Anonymous, another “hacktivist” group with similar anti-corporate and anti-authority politics.” 55,000+ Twitter Accounts Hacked, How To Tell If Yours Was Among Them http://www.technobuffalo.com/internet/social-networking/55000-of-twitter-accounts-hacked-how-to-tell-if-yours-was-among-them/ How to Securely Share a Password with Someone Using LastPass http://lifehacker.com/5909321/how-to-securely-share-a-password-with-someone-using-lastpass Not a bad way to avoid "hey, what's the password to $server" and yelling the answer over the cubicle walls for all to hear. Other ways to securely share or transfer passwords/acess FBI Wants Backdoors in Facebook, Skype and Instant Messaging http://www.wired.com/threatlevel/2012/05/fbi-seeks-internet-backdoors/ Everyone Has Been Hacked. Now What? http://www.wired.com/threatlevel/2012/05/everyone-hacked/ ‘Unknowns’ Hacking Group Hits NASA, Air Force, Harvard and Others in ‘Hacking for Good’ Effort http://www.theblaze.com/stories/unknowns-hacking-group-hits-nasa-air-force-harvard-and-others-in-hacking-for-good-effort/ Use Our Discount Codes Use code SecuraBit_Connect to get $150.00 off of ANY training course. The discount code is good for all SANS courses in all formats. FREE exam attempt with corresponding course purchase for SANSFIRE 2012 with code SecuraBit_SFGIAC Use code 36449 for 20% off your Syngress order! Upcoming events http://www.secore.info Links http://www.carolinacon.org http://www.rvasec.com http://www.richsec.com http://www.gh0st.net Chat with us on IRC at irc.freenode.net #securabitiTunes Podcast – http://itunes.apple.com/us/podcast/securabit/id280048405iPhone App Now Available – http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8

Shift Run Stop
Episode 48: Robert Schifreen

Shift Run Stop

Play Episode Listen Later Oct 14, 2010


Robert Schifreen and Stephen Gold hacked into the Post Office/BT's Viewdata system 'Prestel' back in the 80s, gaining access to thousands of mailboxes (including Prince Philip's). It was the first high profile hacking case in the UK, and resulted in the passing of the Computer Misuse Act. We reminisce with Robert about the good old [...]

Mr Colley's GCSE ICT Podcasts
Ep 6 - Computer Misuse Act

Mr Colley's GCSE ICT Podcasts

Play Episode Listen Later May 28, 2010 5:04


Another of the laws that govern ICT systems.

ict computer misuse act
The Security of Data-Year 8 Podcasts JGS
Computer Misuse Act by Phoebe 8CC

The Security of Data-Year 8 Podcasts JGS

Play Episode Listen Later Feb 26, 2010 2:36


computers computer misuse act
The Security of Data-Year 8 Podcasts JGS
Computer Misuse Act by Octavia & Sophie 8CC

The Security of Data-Year 8 Podcasts JGS

Play Episode Listen Later Feb 12, 2010 1:43


computers computer misuse act