Podcasts about phishers

Act of attempting to acquire sensitive information by posing as a trustworthy entity

  • 65PODCASTS
  • 91EPISODES
  • 29mAVG DURATION
  • ?INFREQUENT EPISODES
  • Apr 24, 2025LATEST
phishers

POPULARITY

20172018201920202021202220232024


Best podcasts about phishers

Latest podcast episodes about phishers

Intego Mac Podcast
Episode 393: Reverse Engineering

Intego Mac Podcast

Play Episode Listen Later Apr 24, 2025 30:46


The Better Business Bureau advises Apple to curb its deceptive Apple Intelligence marketing. What is "slopsquatting"? It doesn't sound very appealing, but it is to cyber criminals. And we've got another reason why phishing scammers love Google services. Show Notes: Urgent: macOS Sequoia 15.4.1, iOS 18.4.1 address 2 zero-day vulnerabilities Josh: Here's why you should stay on the very latest Apple OS Technical analysis of CVE-2025-31201 Apple drops ‘available now' from Apple Intelligence page AI-hallucinated code dependencies become new supply chain risk Cookie-Bite attack PoC uses Chrome extension to steal session tokens OpenAI tells judge it would buy Chrome from Google Phishers abuse Google OAuth to spoof Google in DKIM replay attack Whisky development ends on macOS to help Wine flourish Is 2025 the year of Mac gaming? Top 5 reasons to be a Mac gamer Instagram Launches 'Edits' App to Replace CapCut Intego Mac Premium Bundle X9 is the ultimate protection and utility suite for your Mac. Download a free trial now at intego.com, and use this link for a special discount when you're ready to buy.

The CyberWire
The CyberWire: The 12 Days of Malware. [Special edition]

The CyberWire

Play Episode Listen Later Dec 25, 2024 7:28


Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings & Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect! The 12 Days of Malware lyrics On the first day of Christmas, my malware gave to me: A keylogger logging my keys. On the second day of Christmas, my malware gave to me: 2 Trojan Apps... And a keylogger logging my keys. On the third day of Christmas, my malware gave to me: 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fourth day of Christmas, my malware gave to me: 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fifth day of Christmas, my malware gave to me: 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the sixth day of Christmas, my malware gave to me: 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the seventh day of Christmas, my malware gave to me: 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eighth day of Christmas, my malware gave to me: 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the ninth day of Christmas, my malware gave to me: 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the tenth day of Christmas, my malware gave to me: 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eleventh day of Christmas, my malware gave to me: 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the twelfth day of Christmas, my malware gave to me: 12 Hackers hacking... 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber and Technology with Mike
12 November 2024 Cyber and Tech News

Cyber and Technology with Mike

Play Episode Listen Later Nov 12, 2024 8:57


In today's podcast we cover four crucial cyber and technology topics, including: 1.        Palo Alto investigating potential flaw in product 2.        Attackers abuse VEEAM to deploy ransomware 3.        Haliburton estimates ransomware cost near 35 Million USD 4.        Phishers target Winter Fuel Payment recipients in campaign I'd love feedback, feel free to send your comments and feedback to  | cyberandtechwithmike@gmail.com

Domain Name Wire Podcast
Which domains phishers use – DNW Podcast #495

Domain Name Wire Podcast

Play Episode Listen Later Aug 5, 2024 38:09


A new report sheds light on which domains phishers use to steal information. These days, it seems like a never goes by without someone trying to phish me, either via an email saying a bank account is about to be suspended or a text message trying to scare me into logging into a site. Phishing […] Post link: Which domains phishers use – DNW Podcast #495 © DomainNameWire.com 2024. This is copyrighted content. Domain Name Wire full-text RSS feeds are made available for personal use only, and may not be published on any site without permission. If you see this message on a website, contact editor (at) domainnamewire.com. Latest domain news at DNW.com: Domain Name Wire.

phishing domains phishers domainnamewire dnw
Hacker News Recap
April 10th, 2024 | Twitter's pivot to x.com is a gift to phishers

Hacker News Recap

Play Episode Listen Later Apr 11, 2024 19:09


This is a recap of the top 10 posts on Hacker News on April 10th, 2024.This podcast was generated by wondercraft.ai(00:35): Double-entry bookkeeping as a directed graphOriginal post: https://news.ycombinator.com/item?id=39988993&utm_source=wondercraft_ai(02:22): Twitter's pivot to x.com is a gift to phishersOriginal post: https://news.ycombinator.com/item?id=39991173&utm_source=wondercraft_ai(04:06): Kobo announces color e-readersOriginal post: https://news.ycombinator.com/item?id=39991693&utm_source=wondercraft_ai(05:56): Aider: AI pair programming in your terminalOriginal post: https://news.ycombinator.com/item?id=39995725&utm_source=wondercraft_ai(07:54): 2023 ACM Turing Prize awarded to Avi WigdersonOriginal post: https://news.ycombinator.com/item?id=39990004&utm_source=wondercraft_ai(09:38): EPA Says 'Forever Chemicals' Must Be Removed from Tap WaterOriginal post: https://news.ycombinator.com/item?id=39996433&utm_source=wondercraft_ai(11:41): Deep BugOriginal post: https://news.ycombinator.com/item?id=39988716&utm_source=wondercraft_ai(13:23): Code search is hardOriginal post: https://news.ycombinator.com/item?id=39993976&utm_source=wondercraft_ai(15:04): Meta used monolithic architecture to ship Threads in only five monthsOriginal post: https://news.ycombinator.com/item?id=39987466&utm_source=wondercraft_ai(16:53): Meta MTIA v2 – Meta Training and Inference AcceleratorOriginal post: https://news.ycombinator.com/item?id=39991675&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

Dark Rhino Security Podcast
S14 E1 Lie like a Superhero

Dark Rhino Security Podcast

Play Episode Listen Later Mar 1, 2024 52:37


#SecurityConfidential #darkrhiinosecurity This week on Dark Rhiino Security's Security Confidential podcast, Host Manoj Tandon talks to Adam Levin. Adam Adam Levin is a nationally recognized expert on cyber security, privacy, identity theft, fraud, and personal finance and has distinguished himself as a fierce consumer advocate for the past 40 years. Former Director of the New Jersey Division of Consumer Affairs, Levin is the founder of CyberScout and co-founder of Credit.com. He is the author of the critically acclaimed book, Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. 00:00 Introduction 00:19 Our Guest 06:50 Agreeing to the terms 09:34 Why haven't regulators caught up? 14:21 What can we do about Data companies? 18:55 Congress won't deal with Privacy policies 27:20 Lie like a superhero 31:53 Virtual Kidnappings + Safe Words 34:26 Get your house in Order 50:25 More about Adam ---------------------------------------------------------------------- To learn more about Adam visit https://adamlevin.com/about-adam-k-levin/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​ ----------------------------------------------------------------------

The CyberWire
The CyberWire: The 12 Days of Malware. [Special Edition]

The CyberWire

Play Episode Listen Later Dec 23, 2023 7:28


Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings & Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect! The 12 Days of Malware lyrics On the first day of Christmas, my malware gave to me: A keylogger logging my keys. On the second day of Christmas, my malware gave to me: 2 Trojan Apps... And a keylogger logging my keys. On the third day of Christmas, my malware gave to me: 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fourth day of Christmas, my malware gave to me: 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fifth day of Christmas, my malware gave to me: 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the sixth day of Christmas, my malware gave to me: 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the seventh day of Christmas, my malware gave to me: 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eighth day of Christmas, my malware gave to me: 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the ninth day of Christmas, my malware gave to me: 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the tenth day of Christmas, my malware gave to me: 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eleventh day of Christmas, my malware gave to me: 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the twelfth day of Christmas, my malware gave to me: 12 Hackers hacking... 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys.

Email After Hours: The Podcast for Email Senders
Guardians of the Email Galaxy: Global Deliverability Lessons from the Certified Senders Alliance

Email After Hours: The Podcast for Email Senders

Play Episode Listen Later Jul 20, 2023 28:50


In this new episode of Email After Hours, Sebastian Kluth, Team Lead at the Certified Senders Alliance (CSA), shares his insights and trade secrets on the importance of transparency, proper permissioning, and good data in effective email marketing strategies. He'll also dive into lessons senders in all regions can learn from German senders—who enjoy some of the highest inbox placement rates in the world.

The Social-Engineer Podcast
Ep. 160 - Security Awareness Series - Go To The Source So There's No Remorse with Adam Levin (Original Air Date: 12/20/2021)

The Social-Engineer Podcast

Play Episode Listen Later Mar 20, 2023 49:55


This month, Chris Hadnagy and Ryan MacDougall are joined by Adam Levin.  Adam is a nationally recognized expert on cybersecurity, privacy, identity theft, fraud, and personal finance and has distinguished himself as a fierce consumer advocate for the past 50 years. Adam is the former Director of the New Jersey Division of Consumer Affairs, and currently is the founder of CyberScout and co-founder of Credit.com. He is also author of the critically acclaimed book Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. Adam is also the host of the podcast What the Hack with Adam Levin, where they talk to fascinating people about the most terrifying things that ever happened to them in cyberspace. (December 20, 2021) 00:00 – Intro -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ -          Human Behavior Conference – https://humanbehaviorcon.com/ 03:26 - Adam Levin Intro 04:37 – How did you get started in the industry? 07:42 – What has the shift been like in the types of attacks from the 90s until now? 09:53 – How does the recent Robinhood breach tie into what we're discussing? 12:00 – What should people be focusing on when they hear stories like this? 14:28 – Do these simplistic solutions really work? 18:45 – What type of advice would you give to companies that have public facing employees? 20:22 – You said something interesting earlier, “the company has to deal with it empathetically”.  What does that mean to you? 24:51 – Empathy, continued 30:22 – What do you see coming in the near future, what types of scams will become popular? 33:53 – What are some things people can look out for to avoid scams? 38:20 – Do you find that catastrophe and the emotional factor is used to get people to fall for scams? 41:39 – Finding Adam on the web: -          www.adamlevin.com -          https://adamlevin.com/what-the-hack/ 42:57 – What are some action steps corporations can take to protect themselves? 45:13 – Who is your greatest mentor? -          Virginia Long, director of Consumer Affairs -          Ian Cohen – CEO of Lokker, a privacy company -          Bill Tait – Vice Chairman at Humana -          Jennifer Leuer – came from Experian 47:40 – Book Recommendations -          Condor – TV Show -          Spy novels (none specifically suggested) authors: Tom Clancy, Brad Thor, Vince Flynn -          Yellowstone – TV Show series -          FBI series and all spinoffs 49:16 – Outro -          www.innocentlivesfoundation.org -          www.social-engineer.com -          www.pro-rock.com

Cyber Security Headlines
Week in Review: Charter Communications breach, ChatGPT grows stronger, Microsoft verifies phishers

Cyber Security Headlines

Play Episode Listen Later Feb 3, 2023 22:23


Link to Blog Post This week's Cyber Security Headlines - Week in Review, January 30-February 3, is hosted by Rich Stroffolino  with our guest, David Nolan, VP, Enterprise Risk & Chief Information Security Officer – Aaron's Thanks to our show sponsor, Hunters Hunters is a complete SOC platform, purpose built for your Security Operations team. Hunters' brand new IOC Search is a game-changing search tool that determines if a known ‘Indicator of Compromise' has been in your organization's environment - without needing to write a single line of code. Type an IOC into the search bar, hit ‘enter' and get results within seconds. Visit hunters.ai to learn more. All links and the video of this episode can be found on CISO Series.com  

Cyber Security Headlines
Microsoft phishers are 'Verified' Cloud Partners, DocuSign brand impersonation attack, Google Fi data breach

Cyber Security Headlines

Play Episode Listen Later Feb 1, 2023 7:00


Microsoft grants phishers 'Verified' Cloud Partner status DocuSign brand impersonation attack targets thousands of users Google Fi says hackers accessed customer information Thanks to this week's episode sponsor, Hunters Hunters is a SaaS platform, purpose built for your Security Operations team. Solaris Group, a leading German FinTech, implemented Hunters SOC Platform to eliminate the burden of threat detection and correlation – allowing SOC analysts to focus on higher-value tasks. It's time to move beyond SIEM. Visit hunters.ai to learn more. For the stories behind the headlines, visit CISOseries.com

The CyberWire
The CyberWire: The 12 Days of Malware.[Special Editions]

The CyberWire

Play Episode Listen Later Dec 25, 2022 7:28


Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings & Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect! The 12 Days of Malware lyrics On the first day of Christmas, my malware gave to me: A keylogger logging my keys. On the second day of Christmas, my malware gave to me: 2 Trojan Apps... And a keylogger logging my keys. On the third day of Christmas, my malware gave to me: 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fourth day of Christmas, my malware gave to me: 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fifth day of Christmas, my malware gave to me: 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the sixth day of Christmas, my malware gave to me: 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the seventh day of Christmas, my malware gave to me: 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eighth day of Christmas, my malware gave to me: 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the ninth day of Christmas, my malware gave to me: 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the tenth day of Christmas, my malware gave to me: 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eleventh day of Christmas, my malware gave to me: 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the twelfth day of Christmas, my malware gave to me: 12 Hackers hacking... 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys.

Hacking Humans
The CyberWire: The 12 Days of Malware.[Special Editions]

Hacking Humans

Play Episode Listen Later Dec 25, 2022 7:28


Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings & Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect! The 12 Days of Malware lyrics On the first day of Christmas, my malware gave to me: A keylogger logging my keys. On the second day of Christmas, my malware gave to me: 2 Trojan Apps... And a keylogger logging my keys. On the third day of Christmas, my malware gave to me: 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fourth day of Christmas, my malware gave to me: 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fifth day of Christmas, my malware gave to me: 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the sixth day of Christmas, my malware gave to me: 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the seventh day of Christmas, my malware gave to me: 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eighth day of Christmas, my malware gave to me: 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the ninth day of Christmas, my malware gave to me: 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the tenth day of Christmas, my malware gave to me: 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eleventh day of Christmas, my malware gave to me: 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the twelfth day of Christmas, my malware gave to me: 12 Hackers hacking... 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys.

Daily Crypto Report
"Coin Center sues Treasury Department" October 13, 2022

Daily Crypto Report

Play Episode Listen Later Oct 13, 2022 6:10


Today's blockchain and cryptocurrency news Bitcoin is up .5% at $18,760 Ethereum is up slightly at $1243 Binance Coin is up .5% at $262 Crypto .com picks Paris as European HQ. Coin Center sues Treasury Department over Tornado Cash sanctions Copper picks up 196M in Series C Eclipse picks up 15M in funding. Phishers of Bored Apes indicted in Paris. Learn more about your ad choices. Visit megaphone.fm/adchoices

All the Hacks
Build Rapport, Master Conversational Skills and Learn Anything From Anyone with Andrew Warner

All the Hacks

Play Episode Listen Later Sep 21, 2022 53:17 Very Popular


#79: Entrepreneur and author, Andrew Warner, joins Chris to talk about ways to become a better, more exciting conversationalist. They discuss why this is a skill everyone should master and learn what most people get wrong about how they ask questions. Andrew shares ways to improve the kinds of questions you ask and how to build rapport with people you have just met.Andrew Warner(@AndrewWarner) is an entrepreneur and host of the hit startup podcast, where, 2,000+ episodes, he uncovers the secrets of the world's best founders. After building two startups of his own, he started Mixergy, a place where successful people teach ambitious upstarts through interviews, courses, masterclasses, and events. His book is Stop Asking Questions: How to Lead High-Impact Interviews and Learn Anything from Anyone.Full show notes at: https://allthehacks.com/interviews-andrew-warner Partner Deals ButcherBox: High-quality meat, delivered to your door + 2 Free NY Strips/LobsterVuori: 20% off the most comfortable performance apparel I've ever wornMasterClass: Learn from the world's best with 15% offBlockFi: Exclusive bonus of up to $250 free Selected Links From The EpisodeConnect with Andrew Warner: Website | TwitterAndrew Warner's Resources:Book: Stop Asking Questions: How to Lead High-Impact Interviews and Learn Anything from AnyonePodcast: Startup Stories - MixergyPodcast Episodes Mentioned:All the Hacks Podcast:Cybersecurity and Protecting Yourself from Scammers, Phishers, and Identity Thieves with Adam LevinHosting Cocktail Parties, Building Relationships, Museum Hacks and Friends Newsletters with Nick GrayBuilding The Tim Ferriss Show to 700+ Million DownloadsStartup Stories - Mixergy:Jason Fried on valuations, Basecamp, and why he's no longer poking the world in the eyeHow Chess.com scaled a massive communityI FailedHow Netflix founder finds inspiring ideasResources Mentioned: How to Win Friends & Influence PeopleWingmanLibby AppLibrary Extension Full Show NotesBecoming a better conversationalist: instead of asking questions, use “magical phrases” [1:38]Andrew explains why he wrote his book [3:25]Learning to project confidence and direct the conversation during a job interview [4:02]Questions to ask yourself when preparing for an upcoming conversation [5:50]How to prepare yourself for conversations with people you don't know [7:52]Keeping a Google doc of techniques for having better conversations, and why you should join the resistance [10:02]Methods to get guarded people to be more open [13:30]Examples of positive tangible outcomes [18:08]Using conversational tactics outside of a business setting [19:36]  Becoming more of a learner and less of a know-it-all [20:43]How to shift a conversation to find an overlap of interests  [24:11]Studying conversation transcripts to improve your conversational skills (and how to get consent to record) [26:53]Becoming a better conversationalist by practicing with people you're not as concerned about [33:40]How vulnerability can be valuable [38:22]Seeking permission to ask uncomfortable questions [39:37]How to follow up with someone after you've built a relationship [43:54]Andrew's advice about listener engagement [47:53]A “No” is good [52:33]How you can help All The Hacks [54:03]Andrew's feedback for Chris [55:23]Where to Find Andrew Warner online [57:40]Library App Resources [58:00] PartnersButcherBoxButcherBox makes it easy to get high-quality, humanely raised meat that you can trust. They deliver delicious, grass-fed beef, free-range organic chicken; heritage-breed pork, and wild-caught seafood directly to your door. You can pick a curated box or customize your own. And I'll save you some time, I compared the prices to what I can get locally at Whole Foods and Safeway and ButcherBox is a better deal.To get two 10 oz New York strip steaks and 8 oz of lobster claw and knuckle meat FREE in your first order + a $10 coupon, go to allthehacks.com/butcherbox VuoriVuori is a new and fresh perspective on performance apparel. Perfect if you are sick and tired of traditional, old workout gear. Everything is designed to work out in, but doesn't look or feel like it. The product is incredibly versatile and can be used for just about any activity like running, training, swimming, yoga; but also great for lounging or weekend errands.To get the most comfortable and versatile clothing on the planet with 20% off your first purchase (plus free shipping on any US order over $75 and free returns) visit allthehacks.com/vuori MasterClassWith MasterClass, you can learn from the world's best minds - anytime, anywhere, and at your own pace. With over 100 classes from a range of world-class instructors like Steph Curry, Richard Branson and Martin Scorsese, that thing you've always wanted to do is way closer than you think. When I signed up a few years ago, I jumped straight into an amazing cooking class by Thomas Keller that has totally leveled up my skills in the kitchen. I also really enjoyed FBI Hostage Negotiator, Chris Voss' class on the art of negotiation.With every class I've taken I'm blown away by the depth of knowledge the instructors have and the quality of the experience. I highly recommend you check it out. Get unlimited access to every MasterClass and 15% off an annual membership at allthehacks.com/masterclass BlockFiIf you're interested in Crypto, BlockFi is one of the best ways to get started, letting you easily buy, sell and store your crypto assets. After signing up and linking your bank account, you can instantly trade a variety of cryptocurrencies and store them all in a secure wallet that lets you control and transfer your holdings however you want. You can also set up recurring transfers so you can dollar cost average your crypto investments over time.Or if you want another way to put your crypto investing on autopilot, there's the BlockFi Crypto Rewards Credit Card. While 1.5% cash back isn't the best in the market, that cash back is automatically invested into Bitcoin, Ethereum or whatever cryptocurrency you want. If you want to check out BlockFi, you can get an exclusive bonus of up to $250 free when you sign at allthehacks.com/blockfi Connect with All the HacksAll the Hacks: Newsletter | Website | Facebook | EmailChris Hutchins: Twitter | Instagram | Website | LinkedIn

All the Hacks
Cybersecurity and Protecting Yourself from Scammers, Phishers, and Identity Thieves With Adam Levin

All the Hacks

Play Episode Listen Later Sep 14, 2022 70:42 Very Popular


#77: Cybersecurity expert, Adam Levin, joins Chris to discuss all things cybersecurity, privacy, identity theft, and fraud. They cover how to avoid becoming a victim of online scams, ways to ​​effectively monitor your credit, managing the damages of identity incidents and methods to protect your personal information online. Adam Levin (@Adam_K_Levin) is a consumer affairs advocate and cofounder of Credit.com and CyberScout. His mission is to educate consumers, businesses, law enforcement officials and lawmakers about consumer privacy, identity management, and protection. Adam's weekly cybersecurity podcast is What The Hack and his critically acclaimed book is Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves.Full show notes at: https://allthehacks.com/cybersecurity-adam-levinWatch on YouTube: https://youtu.be/gTGIa3fwmsk Partner Deals DeleteMe: 20% off removing your personal info from the webDaffy: Free $25 to give to the charity of your choiceGoodr: Free shipping on $25 stylish and comfortable sunglassesInside Tracker: 20% off personalized wellness & nutrition plans backed by science Selected Links From The EpisodeConnect with Adam Levin: Website | TwitterAdam Levin's Resources::Book: Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity ThievesPodcast: What The Hack With Adam LevinEpisodes Mentioned:Episode 20: Axton Goes Looking For Her Identity ThiefEpisode 2: Christen's Enemy with BenefitsEpisode 11: Mary Snags a CatfishResources Mentioned: Have I Been PwnedAnnual Credit Report.comCredit KarmaConsumer Federation of AmericaAuraLifelockExperian ProtectMyIDIdentity Theft Resource CenterConsumer Financial Protection BureauReputation DefenderAbineGoogle AuthenticatorAuthy1PasswordYubico  Full Show NotesThe importance of protecting yourself online with secure passwords and keeping your phone numbers private   [1:28]Protecting yourself from SIM swapping: the fundamental basics [3:27]Lie like a superhero when setting up security questions [6:23]Protecting your credit identity [7:29]The three M's: minimize, monitor, manage [9:19]Six ways to ​​effectively monitor your credit activity [9:50]Should you pay for credit monitoring and reporting services? [14:04]Managing the damage of identity incidents [14:58]Deciding if you need help from an expert [15:34]  Credit monitoring service resources [17:26]Stolen SSN: what is your liability? [20:12]Different levels of identity theft and the evolution of the blame game [23:11]Criminal identity theft: are there services available to avoid becoming a victim? [26:28]How to avoid falling for online scams [28:20]More advice about online security, protecting your financial identity, and avoiding scams [31:25]Minimizing your risk: how to function as safely as possible in a “surveillance economy” [41:19]Chris shares methods he uses to protect his personal information and financial identity online [49:21]Hardware security keys vs. Google Authenticator or other apps [50:52]Adam and Chris discuss the importance of safely storing written passwords and share more ways to remove personal information from the internet [52:08]Using Google Voice as a secondary phone number and protecting yourself from being scammed [53:39]Are VPNs necessary? [55:44]Protecting yourself by limiting or disabling location services [57:32]Regularly auditing authorizations from other accounts [59:24]Adam's message to those who are anxious about security breaches [1:02:21]Where to find Adam Levin online [1:08:46] PartnersDeleteMeDeleteMe is a simple subscription, privacy service for reducing unwanted personal information exposed on the public Web. They'll remove your cell phone #, address, email, family members and more from hundreds of data broker websites and then continuously scan for new data that shows up and get that removed as well. On average DeleteMe finds and removes over 2,000 pieces of data for a customer in their first two years.Get 20% off a plan for you or your entire family at allthehacks.com/deleteme InsideTrackerInsideTracker provides a personalized plan to improve your metabolism, reduce stress, improve sleep, and optimize your health for the long haul. It's created by leading scientists in aging, genetics, and biometrics. They analyze your blood, DNA, and fitness tracking data to identify where you're optimized—and where you're not. With InsideTracker you'll get a daily Action Plan with personalized guidance on the right exercise, nutrition, and supplementation for your body.For a limited time, you can get 20% off at allthehacks.com/insidetracker DaffyDaffy is a not-for-profit community built around a new modern way to give, with a mission to help people be more generous, more often. Daffy makes it so much easier to put money aside for charity. You can make your tax deductible contributions all at once. Or you can set aside a little each week or month. Then anytime in the future, you can give to more than one and a half million charities, schools, and faith-based organizations in a matter of seconds.So you can separate the decision to give (and get your tax deduction) from deciding exactly which organization you want to support and when. My favorite part is that you can invest your contributions to your Daffy account so they can grow tax-free to let you have even more impact in the future. To start giving today and get your free $25 to give to the charity of your choice, go to allthehacks.com/daffy GoodrGoodr makes $25 active sunglasses that don't slip, don't bounce, and are 100% polarized. They're lightweight, stylish and comfortable. I love my Goodrs and have been wearing them everywhere, from running to hiking, just hanging out or watching the sunset. Also, because they're so affordable I never worry about losing or breaking them.To get free shipping and a 30-day money back guarantee go to allthehacks.com/goodr Connect with All the HacksAll the Hacks: Newsletter | Website | Facebook | EmailChris Hutchins: Twitter | Instagram | Website | LinkedIn

Tech Talk Y'all
You can buy a $6,000 toilet on Amazon, what?

Tech Talk Y'all

Play Episode Listen Later Aug 15, 2022 31:51


In this episode: Amazon buying iRobot in a $1.7 billion all-cash deal Elon Musk sells 7.92 million Tesla shares worth $6.88 billion Jeff Bezos' Megayacht Was Quietly Towed From a Dutch Shipyard — Watch the Video California Regulator Accuses Tesla of Falsely Advertising Autopilot DuckDuckGo browser's stricter privacy protection will also apply to Microsoft scripts now Slack resets passwords after exposing hashes in invitation links AD BREAK Netflix is expanding its push into video games, but few subscribers are playing along Burger King just emailed everyone a blank receipt in a whopper of a mistake Phishers who breached Twilio and targeted Cloudflare could easily get you, too Man who built ISP instead of paying Comcast $50K expands to hundreds of homes Weird and Wacky: Britney Spears - Toxic (on Devices feat. Epilator) Boeing 737 mysteriously discovered in random field and no one knows how it got there Copy-paste error results in Nevada homebuyer getting 87 properties for the price of one home Tech Rec: Sanjay - GeoGuessr - Siberia or Japan? Expert Google Maps Players Can Tell at a Glimpse. Adam - Spotify Car Thing pRvX5DgMEyTG8efbxkwl --- Send in a voice message: https://anchor.fm/techtalkyall/message

Security Squawk
Twitter zero day- Twilio Breach- Phishing emails coming from PayPal and QuickBooks - Phishers getting around MFA in Coinbase

Security Squawk

Play Episode Listen Later Aug 10, 2022 35:23


In this week's episode the cybersecurity experts Bryan Hornung, Reginald Andre, Randy Bryan, and Ryan O'Hara discuss two data breaches, Twitter and Twilio. Twitter confirms that zero-day was used to expose data of 5.4 million accounts. The experts will get into what happened here and how you can protect your social media accounts. Also, the crew gets into Twilio who discloses a data breach after an SMS phishing attack on employees. Next, the team discusses what your next phishing email could be from, like Paypal and Quick Books. Lastly, the experts get into why phishers are making their way around 2FA and using other tactics like a phishing campaign aimed to take over Coinbase. Tune in! Like and Subscribe! Articles that were used in the show: https://www.bleepingcomputer.com/news/security/twitter-confirms-zero-day-used-to-expose-data-of-54-million-accounts/ https://www.bleepingcomputer.com/news/security/twilio-discloses-data-breach-after-sms-phishing-attack-on-employees/ https://www.ghacks.net/2022/08/08/your-next-phishing-email-may-come-straight-from-paypal/ https://threatpost.com/phishers-2fa-coinbase/180356/

Case Interview Preparation & Management Consulting | Strategy | Critical Thinking
465: Adam Levin, How to Protect Yourself from Cyber Threats

Case Interview Preparation & Management Consulting | Strategy | Critical Thinking

Play Episode Listen Later Apr 20, 2022 66:21


Welcome to an episode with a recognized expert on cybersecurity, privacy, identity theft, fraud, and personal finance, Adam Levin. In this episode, Adam speaks about various digital threats that individuals and organizations face today. He shares that anyone can be a cyber-crime target: consumers, businesses, companies, or the government. He shares valuable insights about cybersecurity and ways to protect yourself and your organization from cyber-crimes. Adam K. Levin is the Former Director of the New Jersey Division of Consumer Affairs, the founder of CyberScout, and co-founder of Credit.com. He is a graduate of Stanford University and the University of Michigan School of Law. Levin is a sought-after speaker who, during his career in the public and private sectors, has shared his expertise with numerous state and federal regulators and legislative committees, and appeared before a wide variety of organizations—government, law enforcement, public interest, education, human resources, insurance and financial services—throughout the United States and Europe. Levin's mission is to educate consumers, businesses, law enforcement officials, and lawmakers on identity management and protection, privacy, credit, and election security issues. He has appeared on The Today Show, Good Morning America, CBS Evening News, CNBC Closing Bell, MSNBC, Fox Business, Fox & Friends, ABC World News Tonight, ABC News Nightline, PBS Nightly Business Report, and many others. His radio appearances include NPR, ABC News Radio, Bloomberg Radio, the Associated Press Radio, CBS News Radio, 1010 Wins, WTOP and SiriusXM. Levin is also a regular commentator for print and digital journalism, including the New York Times, Associated Press, the Wall Street Journal, the Los Angeles Times, USA Today, and the Chicago Tribune. Check out a fun cybersecurity podcast with Adam Levin: "What the Hack with Adam Levin" is true cybercrime with dad jokes. It's a no-shame zone for anyone who's ever been scammed, hacked, phished or cyber-bushwhacked. Every week, it features fascinating people talking about the terrifying, annoying, embarrassing, or infuriating things they've experienced online. Join consumer affairs veteran Adam Levin with co-hosts Beau “Hack Me” Friedlander and Travis “Here's What Actually Happened” Taylor for a good story and tips on how to make yourself a little harder to hack. Get Adam's book here:  Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. Adam Levin: https://amzn.to/3sKTO42

Science Salon
264. Adam Levin on Identity Theft and How to Protect Yourself from Scammers, Phishers, and Fraudsters of All Types

Science Salon

Play Episode Listen Later Apr 18, 2022 100:42 Very Popular


Increasingly, identity theft is a fact of life: from fake companies selling “credit card insurance”; criminal, medical, and child identity theft; catphishers, tax fraud, fake debt collectors who threaten you with legal action; and much more. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam filters, and those are good ideas as far as they go. But with the breaches of huge organizations like Target, AshleyMadison.com, JPMorgan Chase, Sony, Anthem, and even the U.S. Office of Personnel Management, more than a billion personal records have already been stolen, and chances are good that you're already in harm's way. This doesn't mean there's no hope. Your identity may get stolen, but it doesn't have to be a life-changing event. In this conversation, Shermer speaks with Adam Levin, a consumer advocate with more than 30 years' experience in personal finance, privacy, real estate and government service. A former director of the New Jersey Division of Consumer Affairs, Levin is Chairman and founder of Identity Theft 911. A longtime consumer advocate and identity fraud expert, Levin provides a method to help you keep hackers, phishers, and spammers from becoming your problem. As Levin shows, these folks get a lot less scary if you see them coming.

American Road Trip Talk
How to Beat the Travel Scammers

American Road Trip Talk

Play Episode Listen Later Mar 11, 2022 26:38


Planning a vacation? Don't get ripped off! Adam K. Levin is a consumer advocate with more than 40 years of experience and is a nationally recognized expert on security, privacy, phishing schemes and identity theft. He is the founder of CyberScout and author of the book “Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves.” Before you venture out, listen to this episode for great advice on outwitting the con artists.

Alternative Talk- 1150AM KKNW
American Road Trip Talk 03 - 11 - 22 How to Beat the Travel Scammers

Alternative Talk- 1150AM KKNW

Play Episode Listen Later Mar 11, 2022 26:42


Planning a vacation? Don't get ripped off! Adam K. Levin is a consumer advocate with more than 40 years of experience and is a nationally recognized expert on security, privacy, phishing schemes and identity theft. He is the founder of CyberScout and author of the book “Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves.” Before you venture out, listen to this episode for great advice on outwitting the con artists.

Hacking Humans
Technology's effects on students during the pandemic.

Hacking Humans

Play Episode Listen Later Mar 10, 2022 40:17


Guest Justin Reilley, the CEO of Impero, stops by to talk with Dave Bittner about the mental health of kids in the digital age, Dave's got a story about large-scale phishing campaigns targeting the Indian Electric Vehicle consumers and businesses, Joe's story is from Vade sharing the top 20 most impersonated brands in phishing, and our Catch of the Day comes from Bob, a friend and former coworker of Joe's who received a smishing attempt via text from a "friend" and how he expertly turned the tables on the scammer. Links to stories: Unearthing the Million Dollar Scams Targeting the Indian Electric Vehicle Industry Vade Releases 2021 Phishers' Favorites Report Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Hack Naked News (Audio)
MFA Fatigue, WordPress Vuln, Iranian Code, & Free Crypto! (Scams) - Wrap Up - SWN #188

Hack Naked News (Audio)

Play Episode Listen Later Feb 18, 2022 25:16


This week, Guest Host Aaran Leyland talks: Phishers, WordPress, Free Crypto Scams, Ukraine & Russia, MFA and more on the along with the show Wrap Ups for this week in the Security News! Story Links: Ukraine accuses Russia of cyber-attack on two banks and its defence ministry https://www.theguardian.com/world/2022/feb/16/ukraine-accuses-russia-of- cyber-attack-on-two-banks-and-its-defence-ministry Iranian State Broadcaster Clobbered by ‘Clumsy, Buggy' Code https://threatpost.com/iranian-state-broadcaster-clumsy-buggy-code/178524/ Phishers Spoof Power BI to Visualize Your Credential Data https://cofensestaging.wpengine.com/blog/phishers-spoof-power-bi-to-visualize-your-credential-data?web_view=true Vulnerability found in WordPress plugin with over 3 million installations https://www.zdnet.com/article/vulnerability-found-in-wordpress-plugin-with-over-3-million-installations/&web_view=true MFA fatigue attacks: Users tricked into allowing device access due to overload of push notifications https://portswigger.net/daily-swig/mfa-fatigue-attacks-users-tricked-into-allowing-device-access-due-to-overload-of-push-notifications?&web_view=true FreeCryptoScam  A New Cryptocurrency Scam That Leads to Installation of Backdoors and Stealers https://www.zscaler.com/blogs/security-research/freecryptoscam-new-cryptocurrency-scam-leads-installation-backdoors-and?&web_view=true Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/swn for all the latest episodes!  Show Notes: https://securityweekly.com/swn188

Paul's Security Weekly
MFA Fatigue, WordPress Vuln, Iranian Code, & Free Crypto! (Scams) - Wrap Up - SWN #188

Paul's Security Weekly

Play Episode Listen Later Feb 18, 2022 25:16


This week, Guest Host Aaran Leyland talks: Phishers, WordPress, Free Crypto Scams, Ukraine & Russia, MFA and more, along with the show Wrap Ups for this week in the Security News! Story Links: Ukraine accuses Russia of cyber-attack on two banks and its defence ministry https://www.theguardian.com/world/2022/feb/16/ukraine-accuses-russia-of- cyber-attack-on-two-banks-and-its-defence-ministry Iranian State Broadcaster Clobbered by ‘Clumsy, Buggy' Code https://threatpost.com/iranian-state-broadcaster-clumsy-buggy-code/178524/ Phishers Spoof Power BI to Visualize Your Credential Data https://cofensestaging.wpengine.com/blog/phishers-spoof-power-bi-to-visualize-your-credential-data?web_view=true Vulnerability found in WordPress plugin with over 3 million installations https://www.zdnet.com/article/vulnerability-found-in-wordpress-plugin-with-over-3-million-installations/&web_view=true MFA fatigue attacks: Users tricked into allowing device access due to overload of push notifications https://portswigger.net/daily-swig/mfa-fatigue-attacks-users-tricked-into-allowing-device-access-due-to-overload-of-push-notifications?&web_view=true FreeCryptoScam  A New Cryptocurrency Scam That Leads to Installation of Backdoors and Stealers https://www.zscaler.com/blogs/security-research/freecryptoscam-new-cryptocurrency-scam-leads-installation-backdoors-and?&web_view=true Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/swn for all the latest episodes!  Show Notes: https://securityweekly.com/swn188

The Strategy Skills Podcast: Management Consulting | Strategy, Operations & Implementation | Critical Thinking

Welcome to Strategy Skills episode 204, an episode with a recognized expert on cybersecurity, privacy, identity theft, fraud, and personal finance, Adam Levin. In this episode, Adam speaks about various digital threats that individuals and organizations face today. He shares that anyone can be a cyber-crime target: consumers, businesses, companies, or the government. He shares valuable insights about cybersecurity and ways to protect yourself and your organization from cyber-crimes. Adam K. Levin is the Former Director of the New Jersey Division of Consumer Affairs, the founder of CyberScout, and co-founder of Credit.com. He is a graduate of Stanford University and the University of Michigan School of Law. Levin is a sought-after speaker who, during his career in the public and private sectors, has shared his expertise with numerous state and federal regulators and legislative committees, and appeared before a wide variety of organizations—government, law enforcement, public interest, education, human resources, insurance and financial services—throughout the United States and Europe. Levin's mission is to educate consumers, businesses, law enforcement officials, and lawmakers on identity management and protection, privacy, credit, and election security issues. He has appeared on The Today Show, Good Morning America, CBS Evening News, CNBC Closing Bell, MSNBC, Fox Business, Fox & Friends, ABC World News Tonight, ABC News Nightline, PBS Nightly Business Report, and many others. His radio appearances include NPR, ABC News Radio, Bloomberg Radio, the Associated Press Radio, CBS News Radio, 1010 Wins, WTOP and SiriusXM. Levin is also a regular commentator for print and digital journalism, including the New York Times, Associated Press, the Wall Street Journal, the Los Angeles Times, USA Today, and the Chicago Tribune. Check out a fun cybersecurity podcast with Adam Levin: "What the Hack with Adam Levin" is true cybercrime with dad jokes. It's a no-shame zone for anyone who's ever been scammed, hacked, phished or cyber-bushwhacked. Every week, it features fascinating people talking about the terrifying, annoying, embarrassing, or infuriating things they've experienced online. Join consumer affairs veteran Adam Levin with co-hosts Beau “Hack Me” Friedlander and Travis “Here's What Actually Happened” Taylor for a good story and tips on how to make yourself a little harder to hack. Get Adam's book here:  Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. Adam Levin: https://amzn.to/3sKTO42

The CyberWire
The CyberWire: The 12 Days of Malware.

The CyberWire

Play Episode Listen Later Dec 25, 2021 4:43


Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings & Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect! The 12 Days of Malware lyrics On the first day of Christmas, my malware gave to me: A keylogger logging my keys. On the second day of Christmas, my malware gave to me: 2 Trojan Apps... And a keylogger logging my keys. On the third day of Christmas, my malware gave to me: 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fourth day of Christmas, my malware gave to me: 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fifth day of Christmas, my malware gave to me: 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the sixth day of Christmas, my malware gave to me: 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the seventh day of Christmas, my malware gave to me: 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eighth day of Christmas, my malware gave to me: 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the ninth day of Christmas, my malware gave to me: 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the tenth day of Christmas, my malware gave to me: 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eleventh day of Christmas, my malware gave to me: 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the twelfth day of Christmas, my malware gave to me: 12 Hackers hacking... 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys.

Hacking Humans
The CyberWire: The 12 Days of Malware.

Hacking Humans

Play Episode Listen Later Dec 25, 2021 4:43


Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings & Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect! The 12 Days of Malware lyrics On the first day of Christmas, my malware gave to me: A keylogger logging my keys. On the second day of Christmas, my malware gave to me: 2 Trojan Apps... And a keylogger logging my keys. On the third day of Christmas, my malware gave to me: 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fourth day of Christmas, my malware gave to me: 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fifth day of Christmas, my malware gave to me: 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the sixth day of Christmas, my malware gave to me: 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the seventh day of Christmas, my malware gave to me: 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eighth day of Christmas, my malware gave to me: 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the ninth day of Christmas, my malware gave to me: 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the tenth day of Christmas, my malware gave to me: 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eleventh day of Christmas, my malware gave to me: 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the twelfth day of Christmas, my malware gave to me: 12 Hackers hacking... 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys.

The Social-Engineer Podcast
Ep. 160 - Security Awareness Series - Go To The Source So There's No Remorse with Adam Levin

The Social-Engineer Podcast

Play Episode Listen Later Dec 20, 2021 49:55


This month, Chris Hadnagy and Ryan MacDougall are joined by Adam Levin.  Adam is a nationally recognized expert on cybersecurity, privacy, identity theft, fraud, and personal finance and has distinguished himself as a fierce consumer advocate for the past 50 years. Adam is the former Director of the New Jersey Division of Consumer Affairs, and currently is the founder of CyberScout and co-founder of Credit.com. He is also author of the critically acclaimed book Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. Adam is also the host of the podcast What the Hack with Adam Levin, where they talk to fascinating people about the most terrifying things that ever happened to them in cyberspace. December 20, 2021 00:00 – Intro  Social-Engineer.com - http://www.social-engineer.com/  Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/  Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/  Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/  Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb  CLUTCH - http://www.pro-rock.com/  innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/  Human Behavior Conference – https://humanbehaviorcon.com/  03:26 - Adam Levin Intro  04:37 – How did you get started in the industry?  07:42 – What has the shift been like in the types of attacks from the 90s until now?  09:53 – How does the recent Robinhood breach tie into what we're discussing?  12:00 – What should people be focusing on when they hear stories like this?  14:28 – Do these simplistic solutions really work?  18:45 – What type of advice would you give to companies that have public facing employees?  20:22 – You said something interesting earlier, “the company has to deal with it empathetically”.  What does that mean to you?  24:51 – Empathy, continued  30:22 – What do you see coming in the near future, what types of scams will become popular?  33:53 – What are some things people can look out for to avoid scams?  38:20 – Do you find that catastrophe and the emotional factor is used to get people to fall for scams?  41:39 – Finding Adam on the web:  www.adamlevin.com  https://adamlevin.com/what-the-hack/  42:57 – What are some action steps corporations can take to protect themselves?  45:13 – Who is your greatest mentor?  Virginia Long, director of Consumer Affairs  Ian Cohen – CEO of Lokker, a privacy company  Bill Tait – Vice Chairman at Humana  Jennifer Leuer – came from Experian  47:40 – Book Recommendations  Condor – TV Show  Spy novels (none specifically suggested) authors: Tom Clancy, Brad Thor, Vince Flynn  Yellowstone – TV Show series  FBI series and all spinoffs  49:16 – Outro  www.innocentlivesfoundation.org  www.social-engineer.com  www.pro-rock.com 

Everyday MBA
Hackers, Scammers and Identity Thieves

Everyday MBA

Play Episode Listen Later Oct 16, 2021 25:12


Adam Levin discusses the latest issues surrounding hackers, scammers and identity thieves. Adam is an expert in cybersecurity and consumer protection. He is the co-author of the book Swiped - How to Protect Yourself in a World Full of Scammers, Phishers and Identity Thieves, and the host of "What The Hack," a podcast that takes a light-hearted look at the heavy issues surrounding online security, fraud and cyber-crime. Listen for three action items you can use today. Host, Kevin Craine Do you want to be a guest?    

Fintech Unfiltered, by Bank Innovation
Bank overtakes Facebook in hackers' playbook

Fintech Unfiltered, by Bank Innovation

Play Episode Listen Later Sep 28, 2021 10:16


Facebook for years may have topped cybersecurity firm Vade's “Phishers' Favorites,” a report of the most impersonated brands in phishing attacks, but the $2 trillion Credit Agricole bank recently edged out the social media giant with 17,755 unique phishing URLs. Facebook's topple from the No. 1 spot was a surprise, Adrien Gendre, chief product officer at the AI-based cybersecurity firm, tells Bank Automation News in this week's episode of “The Buzz.” “Facebook has been the top of that list for four years,” Gendre says. “Obviously, Credit Agricole is less famous worldwide than Facebook.”  Credit Agricole wasn't the only financial institution to make the list. Seven others, including $3.7 trillion Chase, $1.9 trillion Wells Fargo and $2.98 trillion HSBC, ranked in the top-25 brands used in cyberattacks that leverage fake websites and emails to gain credentials from unsuspecting employees and customers. In this podcast, Gendre and BAN explore how banks became a popular lure for phishing schemes, and what financial institutions can do to protect their brands. 

Rocketship.fm
The ethics and implications of growth at all costs with consumer advocate Adam Levin

Rocketship.fm

Play Episode Listen Later Sep 23, 2021 29:39


With over 50 years working in consumer protections, Adam Levin has helped to spur some of the largest consumer protection cases and has built some of the largest consumer protection brands throughout his career. Today he joins us to discuss what he's learned - from the Firestone Tire Recall of 1978 to building Credit.com. Today Adam is the host of “What the hack with Adam Levin,” and the the author of the Amazon Best Seller Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. *** This episode is brought to you by: Vidyard: The Top Video Tool for SaaS Marketing and Sales http://vidyard.com/rocketship NetSuite: NetSuite by Oracle is a scalable solution to run all of your key back office operations. Go to netsuite.com/rocketship today. Blinkist: Rocketship.fm is now on Blinkist! Listen to 12 minute episodes with no ads! Get seven days free when you check out Blinkist. Indeed: Indeed is the job site that makes hiring as easy as 1-2-3. Get started with a free $75 sponsored job credit at indeed.com/rocketship. BetterHelp: Unlimited Professional Counseling via Online Chat, Video or Phone Anytime, Anywhere. Get 10% off when you visit betterhelp.com/rocketship. Fundrise: Fundrise makes investing in private real estate as easy as investing in stocks, bonds, or mutual funds. Go to fundrise.com/rocketship today. Airfocus: The home for products and the people who build them. Airfocus is an easy-to-use and flexible product management platform that combines product strategy superpowers with modularity. Visit airfocus.com/rocketship and try it for free today. WIX: When your agency partners with Wix, you unlock an entire digital ecosystem for creating, managing and growing your business online. Head over to Wix.com/Partners and reimagine what your agency can accomplish. *** This show is a part of the Podglomerate network, a company that produces, distributes, and monetizes podcasts. We encourage you to visit the website and sign up for our newsletter for more information about our shows, launches, and events. For more information on how The Podglomerate treats data, please see our Privacy Policy.    Since you're listening to Rocketship, we'd like to suggest you also try other Podglomerate shows surrounding entrepreneurship, business, and careers like Creative Elements and Freelance to Founder. Learn more about your ad choices. Visit megaphone.fm/adchoices

ScamWow
134: Lie like a Superhero! Catfishing and Cyber Scams w/ the hosts of What The Hack Podcast With Adam Levin

ScamWow

Play Episode Listen Later Aug 26, 2021 56:14


Two scam crazed worlds collide this week as Caitlin welcomes the hosts of “What The Hack Podcast, With Adam Levin” . Adam Levin, Beau Friedlander, and Travis Taylor help breakdown cyber hackers and catfishing. What are the fundamentals for keeping your privacy safe? Why is it good to lie about where you went to high school and your mother's maiden name? Do you really need help with carrying your bags from Penn Station or are you just a tourist who might get shived? These and SO many more questions just clamoring to be answered, on this super fun episode!  A little more about our guests:  Adam K. Levin,nationally recognized expert on cybersecurity, privacy, identity theft, fraud, and personal finance, Former Director of the New Jersey Division of Consumer Affairs, founder of CyberScout and co-founder of Credit.com. And author of the critically acclaimed book, Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. Beau Friedlander is an award winning publisher, writer and podcast host, writing about cybercrime and scams for more than ten years. His writing has appeared in The New York Times, Time Magazine, NBC News, Harpers Magazine and many other publications. He co-wrote Swiped.  Travis Taylor is a cybersecurity expert who has been a trusty cyber sherpa for Adam and Beau for several years. RESOURCES: https://podcasts.apple.com/my/podcast/dan-stops-a-slow-roll-ransomware-attack/id1571482669?i=1000532778433 https://loudtreemedia.com  https://adamlevin.com  https://twitter.com/Adam_K_Levin https://www.instagram.com/simnyc/ https://www.instagram.com/caitybrodnick/  Scamwowpodcast.com @Scamwowpodcast  We will read your messages  DISCLAIMER: We are comedians and this is satire. C'mon Send us your scams! scamwowpodcast@gmail.com Or call: 347-509-9414 Learn more about your ad choices. Visit megaphone.fm/adchoices

AVLEONOV Podcast
Ep.38 - Security News: Microsoft Patch Tuesday August 2021, Phishers Started Using reCAPTCHA, Scan 1 IP and Go to Jail

AVLEONOV Podcast

Play Episode Listen Later Aug 20, 2021 5:05


Hello everyone! Yet another news episode. Watch the video version of this episode on my YouTube channel. Read the full text of this episode with all links on avleonov.com blog.

ITSPmagazine | Technology. Cybersecurity. Society
Raising Awareness For The Everyday User — Understanding, Education, And No Finger Pointing, Please | Redefining Society With Adam Levin And Beau Friedlander

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 10, 2021 46:01


What the Hack just happened? Did you get Swiped? If you've heard these two guests before, then chances are one or the other (or both) of these things have crossed your mind. Listen in as we have some serious fun with Adam and Beau.About What The Hack With Adam LevinEver click a link and think… "Uh oh!""What the Hack?" is a new podcast that makes getting scammed, hacked, phished or cyber bushwhacked seem a little less terrifying. You might even have fun. It's one part true crime whodunnit (or what happened) and one part how to fix it.Every week the "What the Hack?" crew talks to fascinating people about some of the most terrifying (or annoying, embarrassing, infuriating) things that ever happened to them in cyberspace. "What the Hack?" tells you what happened, what you can do next and how to keep whatever it was from happening again.Adam Levin is the former Director of Consumer Affairs for the State of New Jersey, serial entrepreneur and author of Swiped, which he wrote with his sidekick, writer and cyber mensch, Beau Friedlander. With expert commentary from Travis “Here's What Actually Happened” Taylor, the show gets everything sorted out—or not—but either way you're going to have a great time. Something weird happen to you? We've got your back.______________________________GuestsAdam LevinOn Linkedin

RESET
How To Outsmart Phishers, Robocallers And Other Scammers

RESET

Play Episode Listen Later Jul 7, 2021 22:07


These days, scams come in all shapes and sizes. From repeated phone calls saying a warrant is out for your arrest unless you pay some unheard-of outstanding debt, to a text with a link to track a package you never ordered. Scammers are getting more sophisticated, and it's getting harder to tell a genuine text, email or phone call from a fake one. And it's costing Illinoisans billions of dollars a year. Reset talks to a cyber security expert and a consumer watchdog group for tips on how Illinois residents can identify and protect themselves from phishing scams.

Optrics Insider
Optrics Insider - Which is Bigger 26M or 8.4B? Open Redirects, Akamai Outage & PoE Powered Spam

Optrics Insider

Play Episode Listen Later Jun 22, 2021 20:15


Join Scott Young and Shaun Sturby from Optrics Engineering as they discuss what is bigger - 26 million or 8.4 billion, open redirect, the recent Akamai CDN outage and PoE powered can of spam to stop spam.. Timecodes: 0:00 - Intro 0:21 - Today's 4 topics 0:55 - Topic 1: Which is Bigger 26 Million or 8.4 Billion? 8:01 - Topic 2: Open Redirects 12:11 - Topic 3: Akamai CDN Outage 13:24 - Topic 4: PoE Powered Can of Spam 19:07 - Closing remarks Hackers Stole Nearly 26 Million User Login Credentials for Sites Like Amazon, Google, Facebook between 2018 and 2020: > Nameless malware that stole 1.2 TB of private data > https://twitter.com/troyhunt/status/1402358364445679621?s=21 Password Manager Options Mentioned: > PSafe > ManageEngine Password Manager Pro > RoboForm Google Meet Open Redirects and Why Phishers Love Them: > Open redirects ... and why Phishers love them Akamai experienced an outage for one of its Prolexic DDoS services (Routed 3.0) with approximately 500 customers using this service: > Akamai Provides Prolexic DDoS Service Impact Update (Status: Resolved) PoE-powered can of spam to stop Ad spam: > https://twitter.com/danielhepper/status/1403624545010003970 --- Send in a voice message: https://anchor.fm/optrics-insider/message

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Network Forensics on Azure VMs (Part #2) https://isc.sans.edu/forums/diary/Network+Forensics+on+Azure+VMs+Part+2/27538/ Google Open Redirect Being Abused https://isc.sans.edu/forums/diary/Open+redirects+and+why+Phishers+love+them/27542/ Easy Access to the NIST RDS Database https://isc.sans.edu/forums/diary/Easy+Access+to+the+NIST+RDS+Database/27544/ iOS Wifi Bug https://blog.chichou.me/2021/06/20/quick-analysis-wifid/ NSA VoIP Security Guide https://media.defense.gov/2021/Jun/17/2002744054/-1/-1/1/CTR_DEPLOYING%20SECURE%20VVOIP%20SYSTEMS.PDF

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Network Forensics on Azure VMs (Part #2) https://isc.sans.edu/forums/diary/Network+Forensics+on+Azure+VMs+Part+2/27538/ Google Open Redirect Being Abused https://isc.sans.edu/forums/diary/Open+redirects+and+why+Phishers+love+them/27542/ Easy Access to the NIST RDS Database https://isc.sans.edu/forums/diary/Easy+Access+to+the+NIST+RDS+Database/27544/ iOS Wifi Bug https://blog.chichou.me/2021/06/20/quick-analysis-wifid/ NSA VoIP Security Guide https://media.defense.gov/2021/Jun/17/2002744054/-1/-1/1/CTR_DEPLOYING%20SECURE%20VVOIP%20SYSTEMS.PDF

Little Hills Church
Phishers of Men (May 31, 2021)

Little Hills Church

Play Episode Listen Later May 31, 2021


As we continue our series “the Future is Here,” Pastor Tim digs into Jesus’s warnings about those who will lead many astray — false Messiahs and false prophets.

BarCode
Skeleton Key with Adam Levin

BarCode

Play Episode Listen Later May 7, 2021 54:27


Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. At one point in time, the Social Security number was described as the skeleton key needed to unlock theft of your assets, your identity, and your life. Although that's since changed, and the skeleton key now is much more accessible... and it's ease of obtainability may surprise you.Adam Levin is a nationally recognized expert on cybersecurity, privacy, identity theft, fraud, and personal finance and has distinguished himself as a fierce consumer advocate for the past 40 years. Within his list of esteemed positions include former Director of the New Jersey Division of Consumer Affairs, founder of Cyberscout and co-founder of Credit.com. He is also author of the critically acclaimed book, Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. We chat at the bar about how to prevent identity theft, the new threat to remote workers and businesses, the advancements of AI deepfakes and the future of identity theft, and much more.Tony the Bartender (presumably) captures a "Rye Bandit".Support the show (https://paypal.me/thebarcodepodcast)

ProactiveIT Cyber Security Daily
Episode 228 - 62% of SMBs Do Not Conduct Annual Security Audits

ProactiveIT Cyber Security Daily

Play Episode Listen Later Oct 16, 2020 17:41


Good Morning and Welcome to the ProactiveIT Cyber Security Daily number 228.  It is Friday October 16th 2020.  I am your host Scott Gombar and 62% of SMBs Do Not Conduct Annual Security Audits This podcast is brought to you by Nwaj Tech, a Client Focused and Security Minded IT Consultant based in Central Connecticut.  You can visit us at nwajtech.com  Cyber Security Awareness Tip 16  Beware of Malvertising . Broadvoice Leak Exposes 350M Records, Personal Voicemail Transcripts Carnival Corp. Ransomware Attack Affects Three Cruise Lines Barnes & Noble Hack: A Reading List for Phishers and Crooks Robinhood Internal Probe Finds Hackers Hit Almost 2,000 Accounts SMBs’ size doesn’t make them immune to cyberattacks Twitter outage blocks users from tweeting, seeing notifications Piedmont Cancer Institute Phishing Attack Impacts 5,000 Patients

Paul's Security Weekly TV
Voice Phishers, 'SpiKey' Lock Picking, & Coffee Cup Hackers - PSW #663

Paul's Security Weekly TV

Play Episode Listen Later Aug 22, 2020 80:50


New Microsoft Defender ATP Capability Blocks Malicious Behaviors, Voice Phishers Targeting Corporate VPNs, IBM finds vulnerability in IoT chips present in billions of devices, The Sounds a Key Make Can Produce 3D-Printed Replica, US firm accused of secretly installing location tracking SDK in mobile apps, and Disrupting a power grid with cheap equipment hidden in a coffee cup!   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/psw663

Paul's Security Weekly (Video-Only)
Voice Phishers, 'SpiKey' Lock Picking, & Coffee Cup Hackers - PSW #663

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Aug 21, 2020 80:50


New Microsoft Defender ATP Capability Blocks Malicious Behaviors, Voice Phishers Targeting Corporate VPNs, IBM finds vulnerability in IoT chips present in billions of devices, The Sounds a Key Make Can Produce 3D-Printed Replica, US firm accused of secretly installing location tracking SDK in mobile apps, and Disrupting a power grid with cheap equipment hidden in a coffee cup!   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/psw663

Firewalls Don't Stop Dragons Podcast
COVID19 Privacy: Pro Tips (part 2)

Firewalls Don't Stop Dragons Podcast

Play Episode Listen Later Jun 29, 2020 43:50


In the second half of my interview with Eduard Goodman and Adam Levin from Cyberscout, we discuss the privacy aspects of our new work- and learn-from-home reality. How much privacy should you really expect? What are your legal rights? What should we beware of when using a single device for both work and personal things? How much should companies be willing to spend to make sure their employees and intellectual property are well protected while working from home? How do we avoid, as a democracy, giving up too much privacy with hopes it will make us more secure? Will we ever get that privacy back? We discuss all of this and much more! Eduard Goodman is the Chief Legal Counsel and Global Privacy Officer for CyberScout, a global leader in identity theft resolution, data defense and employee benefits services. An internationally trained attorney and data protection expert, Goodman has more than twenty years of experience in global privacy law and cybersecurity. Adam Levin is a consumer advocate with more than 30 years of experience in security, privacy, personal finance and many other things. He is the former director of the New Jersey Division of Consumer Affairs and current chairman and founder of CyberScout. He is also the author of the book Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. Further Info: CyberScout: https://www.cyberscout.com/enMy Apress Humble Bundle: https://www.humblebundle.com/books/protect-your-stuff-apress-booksPatreon: https://www.patreon.com/FirewallsDontStopDragons

Firewalls Don't Stop Dragons Podcast
COVID19 Security: Pro Tips (part 1)

Firewalls Don't Stop Dragons Podcast

Play Episode Listen Later Jun 22, 2020 41:33


Today I speak with not one but two experts on security and privacy to get their insights, stories and tips on staying safe from scammers and hackers in our new COVID19 pandemic reality. These guys have dealing with cyber incidents every day and bring some unique perspectives. In some ways, it's same stuff, different day; but the pandemic, economy woes and general civil unrest have given the bad guys some fertile material for working their craft. Eduard Goodman is the Chief Legal Counsel and Global Privacy Officer for CyberScout, a global leader in identity theft resolution, data defense and employee benefits services. An internationally trained attorney and data protection expert, Goodman has more than twenty years of experience in global privacy law and cybersecurity. Adam Levin is a consumer advocate with more than 30 years of experience in security, privacy, personal finance and many other things. He is the former director of the New Jersey Division of Consumer Affairs and current chairman and founder of CyberScout. He is also the author of the book Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. Further Info: CyberScout: https://www.cyberscout.com/enMy Apress Humble Bundle: https://www.humblebundle.com/books/protect-your-stuff-apress-booksPatreon: https://www.patreon.com/FirewallsDontStopDragons

Hacking Humans
Every day you're a firefighter.

Hacking Humans

Play Episode Listen Later May 14, 2020 37:17


Dave and Joe have a follow up for a listener, Joe has two stories on different levels of effort of phishing schemes, The Catch of the Day is looking for a sugar baby, and later in the show our interview with Marcus Carey, enterprise architect at ReliaQuest. He’s the author of the book Tribe of Hackers, and he wonders if we are living in a cybersecurity groundhog day. Links to stories: Anatomy of a Well-Crafted UPS, FedEX, and DHL Phishing Email During COVID-19 Phishers target investment brokers, aim for Office, SharePoint login credentials Thanks to our sponsor, KnowBe4.

Check Point CheckMates Cyber Security Podcast
S02E06: Phishers Gonna Phish

Check Point CheckMates Cyber Security Podcast

Play Episode Listen Later Apr 21, 2020 17:23


S02E06: Phishers Gonna Phish by Check Point CheckMates

Le Mémo
Cyberguerre (1/3) : le phishing peut-il faire tomber de gros poissons ?

Le Mémo

Play Episode Listen Later Mar 10, 2020 8:36


Retrouvez ci-dessous tous les articles cités dans cet épisode du Mémo :Phishers prey on fans of 'Star Wars: The Rise of Skywalker' film (Tech republic) Phishing : définition, traduction (Journal du net) Six Cybersecurity Predictions For 2020 (Forbes) L’audacieuse arnaque au «faux Jean-Yves Le Drian» arrive devant la justice (Le Parisien) How phishing attacks trick our brains (MIT Technology Review) Les courriels de phishing en entreprise ça marche encore, voici pourquoi (ZDNet) Phishing Quiz (Google) Everything We Know About the Jeff Bezos Phone Hack (Wired) Iranian hackers target US government workers in new campaign (ZDNet) De la 6G illimitée pendant 100 ans ? La fausse pub d’Orange pour alerter contre le phishing (Le Parisien)Crédits :Le Mémo est un podcast Orange.Cet épisode a été écrit et réalisé en mars 2020 par Spintank dans le studio du Tank media (Paris, 11e). See acast.com/privacy for privacy and opt-out information.

The Score
Part 1: Protecting Your Identity and Credit in the Age of Cyber Warfare

The Score

Play Episode Listen Later Feb 24, 2020 22:55


How do you protect your identity and credit in the age of cyber warfare? Whether you are an individual or a business, learn the landscape of cyber scams, security and how to protect yourself. It's more important than ever to avoid and minimize your risk, or as they call it "point of entry". Adam Levin is the co-founder and former CEO of Credit.com, one of the first websites to make free credit scores available to consumers. He later went on to become Founder and Chairman of CyberScout, an international cyber security firm. From a family of politicians and real estate connoisseurs, Adam Levin paved a different path for himself pioneering the bridge between people and their ability to access their credit score. He is a nationally recognized expert on identity theft and credit, and is the author of SWIPED: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. He has appeared on The Today Show, Good Morning America, CBS Evening News, CNBC Closing Bell, MSNBC, Fox Business, Fox & Friends, ABC World News Tonight, and many others. In this two-part episode, he reflects on his personal journey into the credit and cyber security industries and shares helpful tips along the way. He even shares a unique insight into cyber security for the upcoming presidential election.This is Part One.

The Score
Part 2: Protecting Your Identity and Credit in the Age of Cyber Warfare

The Score

Play Episode Listen Later Feb 24, 2020 21:57


How do you protect your identity and credit in the age of cyber warfare? Whether you are an individual or a business, learn the landscape of cyber scams, security and how to protect yourself. It's more important than ever to avoid and minimize your risk, or as they call it "point of entry". Adam Levin is the co-founder and former CEO of Credit.com, one of the first websites to make free credit scores available to consumers. He later went on to become Founder and Chairman of CyberScout, an international cyber security firm. From a family of politicians and real estate connoisseurs, Adam Levin paved a different path for himself pioneering the bridge between people and their ability to access their credit score. He is a nationally recognized expert on identity theft and credit, and is the author of SWIPED: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. He has appeared on The Today Show, Good Morning America, CBS Evening News, CNBC Closing Bell, MSNBC, Fox Business, Fox & Friends, ABC World News Tonight, and many others. In this two-part episode, he reflects on his personal journey into the credit and cyber security industries and shares helpful tips along the way. He even shares a unique insight into cyber security for the upcoming presidential election.This is Part Two.

The Shared Security Show
Chinese Hackers, Coronavirus Phishing Attacks, How to Stay (Almost) Anonymous Online

The Shared Security Show

Play Episode Listen Later Feb 21, 2020 42:19


In episode 97 of our monthly show we discuss how Chinese hackers caused the Equifax data breach, new coronavirus phishing attacks to be aware of, and how to stay (almost) anonymous online. ** Show notes and links mentioned on the show ** U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack https://krebsonsecurity.com/2020/02/u-s-charges-4-chinese-military-officers-in-2017-equifax-hack/ Phishers impersonate […] The post Chinese Hackers, Coronavirus Phishing Attacks, How to Stay (Almost) Anonymous Online appeared first on The Shared Security Show.

The CyberWire
US off-off-year elections go off OK, but don’t get cocky, kids. US charges three in Saudi spy case. Adware dropping apps removed from Google Play. Patch Confluence.

The CyberWire

Play Episode Listen Later Nov 7, 2019 20:23


The US off-off-year elections seem to have gone off largely free of interference, but officials caution that major foreign influence campaigns can be expected in 2020. Three former Twitter employees are charged with spying for Saudi Arabia. The website defacement campaign in Georgia remains unattributed. Google boots seven adware droppers from the Play Store. Phishers are using web analytics for better hauls. And nation-states are targeting unpatched Confluence. Johannes Ullrich from the SANS Technology Institute on encrypted SNI in TLS 1.3 and how that can be used for domain fronting. Guest is Kevin O’Brien from GreatHorn on managing email threats. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_07.html  Support our show

Turn Your Ears Up
15. Phishers of Men (and Other Bad Evangelism Ideas)

Turn Your Ears Up

Play Episode Listen Later Nov 6, 2019 47:11


Security Forum Podcasts
Adam Levin: Is Scaring Caring When It Comes To Cyber Security?

Security Forum Podcasts

Play Episode Listen Later Jul 9, 2019 10:01


In the final episode of this three-part series, Adam Levin, CEO and founder of Cyber Scout and author of Swiped: How to Protect yourself in a World Full of Scammers, Phishers and Identity Thieves, offers insights into the maturity, collaborative culture, preparation, and responsiveness required for true cyber-resilience. https://www.securityforum.org/videos-podcasts/isf-podcast-adam-levin-is-scaring-caring-when-it-comes-to-cyber-security/

Security Forum Podcasts
Adam Levin: Is Scaring Caring When It Comes To Cyber Security?

Security Forum Podcasts

Play Episode Listen Later Jul 9, 2019 10:01


In the final episode of this three-part series, Adam Levin, CEO and founder of Cyber Scout and author of Swiped: How to Protect yourself in a World Full of Scammers, Phishers and Identity Thieves, offers insights into the maturity, collaborative culture, preparation, and responsiveness required for true cyber-resilience.

Security Forum Podcasts
Adam Levin: Is Scaring Caring When It Comes To Cyber Security?

Security Forum Podcasts

Play Episode Listen Later Jul 9, 2019 10:01


In the final episode of this three-part series, Adam Levin, CEO and founder of Cyber Scout and author of Swiped: How to Protect yourself in a World Full of Scammers, Phishers and Identity Thieves, offers insights into the maturity, collaborative culture, preparation, and responsiveness required for true cyber-resilience.

Security Forum Podcasts
Adam Levin: Is Scaring Caring When It Comes To Cyber Security?

Security Forum Podcasts

Play Episode Listen Later Jul 9, 2019 10:01


In the final episode of this three-part series, Adam Levin, CEO and founder of Cyber Scout and author of Swiped: How to Protect yourself in a World Full of Scammers, Phishers and Identity Thieves, offers insights into the maturity, collaborative culture, preparation, and responsiveness required for true cyber-resilience.

Security Forum Podcasts
Adam Levin: Integrating Cyber Into The DNA Of Your Business

Security Forum Podcasts

Play Episode Listen Later Jul 4, 2019 17:28


In the second episode of this three-part series, Adam Levin, author of Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves, goes into detail about the importance of creating a thorough, integrated, cyber-resilient corporate culture.  https://www.securityforum.org/videos-podcasts/isf-podcast-adam-levin-integrating-cyber-into-the-dna-of-your-business/

Security Forum Podcasts
Adam Levin: Integrating Cyber Into The DNA Of Your Business

Security Forum Podcasts

Play Episode Listen Later Jul 4, 2019 17:28


In the second episode of this three-part series, Adam Levin, author of Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves, goes into detail about the importance of creating a thorough, integrated, cyber-resilient corporate culture.

Security Forum Podcasts
Adam Levin: Integrating Cyber Into The DNA Of Your Business

Security Forum Podcasts

Play Episode Listen Later Jul 4, 2019 17:28


In the second episode of this three-part series, Adam Levin, author of Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves, goes into detail about the importance of creating a thorough, integrated, cyber-resilient corporate culture. 

Security Forum Podcasts
Adam Levin: Integrating Cyber Into The DNA Of Your Business

Security Forum Podcasts

Play Episode Listen Later Jul 4, 2019 17:28


In the second episode of this three-part series, Adam Levin, author of Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves, goes into detail about the importance of creating a thorough, integrated, cyber-resilient corporate culture.

Security Forum Podcasts
Adam Levin: Consumers - Protecting yourself against everyday scams

Security Forum Podcasts

Play Episode Listen Later Jul 2, 2019 17:41


Breaches have become the third certainty in life and cyberwar has replaced the cold war. The truth is we are under attack every minute of every day. So how can we defend against everyday cyber threats? In the first episode of this three-part series, Adam Levin, chairman and founder of CyberScout, co-founder of Credit.com, and author of Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves will be speaking to Steve Durbin, Managing Director, ISF on the hard truth about the insecurity of the modern technology era. Adam and Steve discuss how consumers can better protect their information, the three Ms (minimising risk exposure, monitoring systems and managing damage) and the risks that social media poses. https://www.securityforum.org/videos-podcasts/isf-podcast-adam-levin-consumers-protecting-yourself-against-everyday-scams/

Security Forum Podcasts
Adam Levin: Consumers - Protecting yourself against everyday scams

Security Forum Podcasts

Play Episode Listen Later Jul 2, 2019 17:41


Breaches have become the third certainty in life and cyberwar has replaced the cold war. The truth is we are under attack every minute of every day. So how can we defend against everyday cyber threats? In the first episode of this three-part series, Adam Levin, chairman and founder of CyberScout, co-founder of Credit.com, and author of Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves will be speaking to Steve Durbin, Managing Director, ISF on the hard truth about the insecurity of the modern technology era. Adam and Steve discuss how consumers can better protect their information, the three Ms (minimising risk exposure, monitoring systems and managing damage) and the risks that social media poses.

Security Forum Podcasts
Adam Levin: Consumers - Protecting yourself against everyday scams

Security Forum Podcasts

Play Episode Listen Later Jul 2, 2019 17:41


Breaches have become the third certainty in life and cyberwar has replaced the cold war. The truth is we are under attack every minute of every day. So how can we defend against everyday cyber threats? In the first episode of this three-part series, Adam Levin, chairman and founder of CyberScout, co-founder of Credit.com, and author of Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves will be speaking to Steve Durbin, Managing Director, ISF on the hard truth about the insecurity of the modern technology era. Adam and Steve discuss how consumers can better protect their information, the three Ms (minimising risk exposure, monitoring systems and managing damage) and the risks that social media poses.

Security Forum Podcasts
Adam Levin: Consumers - Protecting yourself against everyday scams

Security Forum Podcasts

Play Episode Listen Later Jul 2, 2019 17:41


Breaches have become the third certainty in life and cyberwar has replaced the cold war. The truth is we are under attack every minute of every day. So how can we defend against everyday cyber threats? In the first episode of this three-part series, Adam Levin, chairman and founder of CyberScout, co-founder of Credit.com, and author of Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves will be speaking to Steve Durbin, Managing Director, ISF on the hard truth about the insecurity of the modern technology era. Adam and Steve discuss how consumers can better protect their information, the three Ms (minimising risk exposure, monitoring systems and managing damage) and the risks that social media poses.

In the Weeds with Dexter Johnson
238: Proton Mail stops the phishers!!

In the Weeds with Dexter Johnson

Play Episode Listen Later May 17, 2019 4:21


Proton Mail aims a providing a secure, privacy focused email service through the means of end to end encryption but hackers always want to get in on the inside. Let's talk about phishing and how they managed to stop it. || Let's continue our discussion! Follow me on Twitter and Instagram at @dexter_johnson and visit http://DexJohnsPC.com to stay on top of my latest blog posts about the world of technology. Share this podcast with a friend!

YourTechReport
One of the best ways to say secure online - Lie! Our conversation with Cyber Security expert Adam Levin of CyberScout.

YourTechReport

Play Episode Listen Later Apr 30, 2019 22:31


Security is always top of mind so we sought out to answer the question "Can we trust Facebook anymore?". This resulted in a great, informative conversation with Cyber Security expert, author and founder of CyberScout - Adam Levin. Take a listen as we dive into topics such as social media, smartphones, identity theft and so much more. A former Director of the New Jersey Division of Consumer Affairs, Mr. Levin is Chairman and founder of CyberScout and co-founder of Credit.com. Adam Levin is the author of Amazon Best Selling Book Swiped: How to Protect Yourself in a World Full of Scammers, Phishers and Identity Thieves.

Firewalls Don't Stop Dragons Podcast
Swiped: Identity Theft (Pt 2)

Firewalls Don't Stop Dragons Podcast

Play Episode Listen Later Apr 21, 2019 35:51


How do you deal with the threat of identity theft? Follow Adam Levin's 3 M's: 1) minimize your exposure, 2) monitor your accounts, and 3) manage the damage. We discuss these techniques and much more in part two of my interview with Adam Levin, author of Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. Adam Levin is a consumer advocate with more than 40 years of experience in security, privacy, personal finance and many other things. He is the former director of the New Jersey Division of Consumer Affairs and current chairman and founder of CyberScout. You may have seen Adam on one of his several TV appearances, as well. Further Info: Adam Levin's website: https://adamlevin.com/Adam's book, Swiped: https://adamlevin.com/swiped-book-adam-levin/CyberScout: https://www.cyberscout.com/ Bruce Schneier's Data and GoliathKevin Mitnick's The Art of InvisibilityBrian Kreb's Spam Nation and his blogIdentity Theft Resource CenterConsumer Federation of AmericaPrivacy Rights Clearinghouse

Firewalls Don't Stop Dragons Podcast
Swiped: Identity Theft (pt 1)

Firewalls Don't Stop Dragons Podcast

Play Episode Listen Later Apr 14, 2019 45:23


Identity theft is arguably one of the worst cyber crimes in terms of deep and lasting impact to the victim. This runs the gamut from simple credit card fraud to committing crimes in someone else's name. We'll talk about the entire spectrum today in part one of my interview with Adam Levin, author of Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. Adam Levin is a consumer advocate with more than 40 years of experience in security, privacy, personal finance and many other things. He is the former director of the New Jersey Division of Consumer Affairs and current chairman and founder of CyberScout. You may have seen Adam on one of his several TV appearances, as well. Further Info: Adam Levin's website: https://adamlevin.com/Adam's book, Swiped: https://adamlevin.com/swiped-book-adam-levin/CyberScout: https://www.cyberscout.com/

Defending Digital: personal cybersecurity & privacy
"Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves" (Book Review)

Defending Digital: personal cybersecurity & privacy

Play Episode Listen Later Oct 3, 2018 14:29


Tips on minimizing your risk of identity theft from the book "Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves" by Adam Levin. Full post: https://defendingdigital.com/swiped-how-to-protect-yourself-in-a-world-full-of-scammers-phishers-and-identity-thieves-book-summary/ Buy "Swiped" on Amazon: https://amzn.to/2zupIF9 (affiliate link)

The Tech Blog Writer Podcast
599: Email Security: Why Impersonations are Still Phishers’ Weapon of Choice

The Tech Blog Writer Podcast

Play Episode Listen Later Aug 6, 2018 32:58


Today's guest on our tech podcast is Kevin O’Brien, CEO of GreatHorn. Phishing continues to be a primary security problem for businesses. Think of all the spoofed emails you probably get from people asking for banking instructions or ‘invoice confirmation,’ messages from ‘banks’ that look surprisingly legit but ask for your credentials, and notes from ‘friends’ that look real but have an attachment that wasn’t expected. GreatHorn is an email security company that was a finalist in the 2017 RSA Innovation Sandbox for its ability to utilize machine learning to automate the identification and remediate advanced email and social engineering attacks. Kevin talks about the latest techniques criminals use, including the use of display name spoofs, social engineering techniques and increase in Business Service Impersonation attacks, where cybercriminals replicate communications from major brands like Walmart, DocuSign, and the US Postal Service. We also discuss email security shortcomings in Office 365 and G Suite include end-user alerts (emails that fail DKIM go to workers, not tech pros), limited malicious URL scanning and limited ability to configure or fine-tune security policies. I also find out more about GreatHorn's useful Phishing Risk Calculator and its annual Cloud Email Security report.    

Grey Mirror: MIT Media Lab’s Digital Currency Initiative on Technology, Society, and Ethics
#20, Taylor Monahan, MyEtherWallet: On Security, the Parity Exploit, Bounties, and Phishers

Grey Mirror: MIT Media Lab’s Digital Currency Initiative on Technology, Society, and Ethics

Play Episode Listen Later Nov 19, 2017 38:39


Taylor Monahan (a co-founder of MyEtherWallet) and I chat about security, the Parity exploit, audits, bounties, the tradeoffs in reusing code, and how to deal with scams/phishers. Support me on Patreon! www.patreon.com/rhyslindmark Thanks to Shapeshift for sponsoring the show! https://shapeshift.io Thanks to Mike Goldin, John Desmond, Colin Wielga, Harry Lindmark, Joe Urgo, John Lindmark, Daniel Segal, Jacob Zax, Katie Powell, Jonathan Isaac, Brady McKenna, Jeff Snyder, Ryan X Charles, Chris Edmonds, Ned Mills, Kenji Williams, Scott Levi, Peter Rodgers, Keith Klundt, and Kenzie Jacobs for supporting me on Patreon!

401(k) Fridays Podcast
Identity Thieves, Hackers & Phishers: Real or Remote Workplace Retirement Plan Threats?

401(k) Fridays Podcast

Play Episode Listen Later Oct 20, 2017 52:00


Are workplace retirement plans vulnerable to cyber threats?  When it comes to cyber threats & workplace retirement plans, what questions should employers be asking their retirement service providers to better understand their security policies?  I address these questions and much more with Lee Harms, Business Information Security Officer for the Principal Financial Group.   Guest Bio Lee Harms is the Business Information Security Officer for the five businesses that make up Retirement and Income Solutions (RIS).   As a BISO he is responsible for the integration of the enterprise information security program within his business unit(s).  Key responsibilities include 3rd party oversight, secure software development, data protection, customer and regulatory requests and incident response. ​Lee’s career with Principal began in 1983 and has included roles leading Enterprise Architecture, application development, Actuarial liaison and Client Administration.  Those roles include Business exposure to individual insurance and retirement business units as well as corporate Information Services.   Lee is a member of the Financial Services Information Sharing and Analysis Center (FS-ISAC) and The Society of Professional Asset-Managers and Recordkeepers (SPARK) Data Security Advisory Board.   Lee graduated from Iowa State University with a Bachelors of Business Administration in Management.    401(k) Fridays Podcast Overview Struggling with a fiduciary issue, looking for strategies to improve employee retirement outcomes or curious about the impact of current events on your workplace retirement plan? We've had conversations with retirement industry leaders to address these and other relevant topics! You can easily explore over eighty five prior on-demand audio interviews here. Don't forget to subscribe as we release a new episode each Friday!  

Appcanary Podcast
Episode 4 - Leakers and Phishers

Appcanary Podcast

Play Episode Listen Later Jul 13, 2017 28:35


Max and Phill talk about Reality Winner’s bad opsec and the huge phishing campaign unearthed by Citizenlab. Produced by Katie Jensen. Your browser does not support the audio element. Show Notes Real Talk on Reality TAINTED LEAKS: Disinformation and Phishing With a Russian Nexus

How Do We Fix It?
Fix It Shorts #4: Why Hacking Threaten All of Us: Adam Levin

How Do We Fix It?

Play Episode Listen Later Jul 27, 2016 12:28


The release of nearly 19,000 e-mails from the Democratic National Committee rocked party leaders and forced the resignation of DNC Chair Debbie Wasserman Schultz. We look at how this happened, why Russia was probably involved and how many other organizations, businesses and government agencies are at risk of cyber break-ins. Adam Levin, co-founder of Credit.com and the online security firm IDT911 says the power grid and financial system are at risk.  He warns of a possible "Cyber-geddon." In this episode of "Fix It Shorts" Adam tells Richard and Jim how all of us can reduce our threat of identity theft and hacking attacks. Adam Levin is a well-known expert on identity theft and credit and the author of "SWIPED: How to Protect Yourself in a World Full of Scammers, Phishers and Identity Thieves." See acast.com/privacy for privacy and opt-out information.

Scammercast Podcast - Awareness, Information and Education About the Most Prolific Scams Out There
Adam Levin Tells Us – It’s Time to Claim Your Credit/Identity Portfolio

Scammercast Podcast - Awareness, Information and Education About the Most Prolific Scams Out There

Play Episode Listen Later Jul 18, 2016 50:35


There hs never been a more important time to realize that it’s time to protect yourself against Scammers, Phishers and those that will go to every length to steal your identity. Adam K. Levin is visiting with us to stress that it really IS TIME for everyone to not just get a reality check, but … Continue reading Adam Levin Tells Us – It’s Time to Claim Your Credit/Identity Portfolio →

AT&T ThreatTraq
ThreatTraq #93 Phishers Abusing Free 30-Day Trials

AT&T ThreatTraq

Play Episode Listen Later May 5, 2014 34:30


0-Day Patch, DVR Scanning Botnet, Traffic Light System Weakness, Phishers Abusing 30-Day Trial, Modifying eBay Listings and the Internet Weather Report. Originally recorded May 6, 2014.

AT&T ThreatTraq
ThreatTraq #86 It's Not Easy Protecting a Home Router

AT&T ThreatTraq

Play Episode Listen Later Mar 17, 2014 29:44


It's Not Easy to Protect a Home Router, Google Docs Targeted by Phishers and the Internet Weather Report. Originally recorded March 18th, 2014.

60-Second Tech
Spear Phishers Want Your Info

60-Second Tech

Play Episode Listen Later May 2, 2013 1:14


The recent AP Twitter account hack looks like an example of a successful spear phishing attack, in which a targeted e-mail duped the news agency's employees. Larry Greenemeier reports

National Cyber Security Radio By Gregory Evans

Phishers, credit-card cloners and identity thieves will be busy today, searching for ways to take advantage of interest in the life and sudden death of North Korean dictator Kim Jong Il. Adobe has warned users of a critical vulnerability in its Flash Player that could potentially allow an attacker to take remote control of the compromised system. The biggest draw in television is entering the cyber world.  The Super Bowl will be streamed online and to phones for the first time, the NFL announced today. Also check out the job of the day!!

TechStuff
What is phishing?

TechStuff

Play Episode Listen Later Jan 12, 2009 22:38


Phishers send emails to strangers, hoping to swindle them out of thousands of dollars. From the notorious Nigerian email scams to fake hard-luck stories, phishing scams depend on the greed of online victims. Learn more in this HowStuffWorks podcast. Learn more about your ad-choices at https://news.iheart.com/podcast-advertisers

Credit Union Information Security Podcast
Phishers, zero days, and crimeware: Institutions Beware! CUInfoSecurity.com interviews Aaron Emigh on Phishing

Credit Union Information Security Podcast

Play Episode Listen Later Mar 23, 2007


Banking Information Security Podcast
Phishers, zero days, and crimeware: Institutions Beware! CUInfoSecurity.com interviews Aaron Emigh on Phishing

Banking Information Security Podcast

Play Episode Listen Later Mar 23, 2007


Tech for Boomers
Tech for Boomers 26 -- Lawsuits against Phishers, Video Software, Nintendo Wii

Tech for Boomers

Play Episode Listen Later Feb 20, 2007


Let's get those Phishers. Andy Marken from Marken Communications discusses video software. Will your cell phone become your digital wallet. The new Nintendo Wii is great for the whole family.

Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Jeremiah Grossman: Phishing with Super Bait (English)

Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference

Play Episode Listen Later Oct 31, 2006 65:44


"The use of phishing/cross-site scripting (XSS) hybrid attacks for financial gain is spreading. It?s imperative that security professionals familiarize themselves with these new threats to protect their websites and confidential corporate information. This isn't just another presentation about phishing scams or cross-site scripting. We?re all very familiar with each of those issues. Instead, we?ll discuss the potential impact when the two are combined to form new attack techniques. Phishers are beginning to exploit these techniques, creating new phishing attacks that are virtually impervious to conventional security measures. Secure sockets layer (SSL), blacklists, token-based authentication, browser same-origin policy, and monitoring / take-down services offer little protection. Even eyeballing the authenticity of a URL is unlikely to help. By leveraging cross-site scripting, the next level of phishing scams will be launched not from look-alike web pages, but instead from legitimate websites! This presentation will demonstrate how these types of attacks are being achieved. We'll also demonstrate the cutting edge exploits that can effectively turn your browser into spyware with several lines of JavaScript. And, we'll give you the steps you need to take to protect your websites from these attacks. Jeremiah Grossman is the founder and Chief Technology Officer of WhiteHat Security (http://www.whitehatsec.com), where he is responsible for web application security R&D and industry evangelism. As a seven-year industry veteran and well-known security expert, Mr. Grossman is a frequent international conference speaker at the Blackhat Briefings, ISSA, ISACA, NASA, and many other industry events. Mr. Grossman's research, writings, and discoveries have been featured in USA Today, VAR Business, NBC, ABC News (AU), ZDNet, eWeek, BetaNews, etc. Mr. Grossman is also a founder of the Web Application Security Consortium (WASC), as well as a contributing member of the Center for Internet Security Apache Benchmark Group. Prior to WhiteHat, Mr. Grossman was an information security officer at Yahoo!, responsible for performing security reviews on the company's hundreds of websites."

Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference

The use of phishing/cross-site scripting hybrid attacks for financial gain is spreading. It's imperative that security professionals familiarize themselves with these new threats to protect their websites and confidential corporate information. This isn't just another presentation about phishing scams or cross-site scripting. We're all very familiar with each of those issues. Instead, we'll discuss the potential impact when the two are combined to form new attack techniques. Phishers are beginning to exploit these techniques, creating new phishing attacks that are virtually impervious to conventional security measures. Secure sockets layer (SSL), blacklists, token-based authentication, browser same-origin policy, and monitoring / take-down services offer little protection. Even eyeballing the authenticity of a URL is unlikely to help. By leveraging cross-site scripting, the next level of phishing scams will be launched not from look-alike web pages, but instead from legitimate websites! This presentation will demonstrate how these types of attacks are being achieved. We'll also demonstrate the cutting edge exploits that can effectively turn your browser into spyware with several lines of JavaScript. And, we'll give you the steps you need to take to protect your websites from these attacks. Jeremiah Grossman is the founder and Chief Technology Officer of WhiteHat Security (http://www.whitehatsec.com), where he is responsible for web application security Rresearch and developmentD and industry evangelism. As a seven-year industry veteran and well-known security expert, Mr. Grossman is a frequent conference speaker at the BlackHat Briefings, ISSA, ISACA, NASA, and many other industry events. Mr. Grossman's research, writings, and discoveries have been featured in USA Today, VAR Business, NBC, ZDNet, eWeek, BetaNews, etc. Mr. Grossman is also a founder of the Web Application Security Consortium (WASC), as well as a contributing member of the Center for Internet Security Apache Benchmark Group. Prior to WhiteHat, Mr. Grossman was an information security officer at Yahoo!, responsible for performing security reviews on the company's hundreds of websites.

Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference

The use of phishing/cross-site scripting hybrid attacks for financial gain is spreading. It's imperative that security professionals familiarize themselves with these new threats to protect their websites and confidential corporate information. This isn't just another presentation about phishing scams or cross-site scripting. We're all very familiar with each of those issues. Instead, we'll discuss the potential impact when the two are combined to form new attack techniques. Phishers are beginning to exploit these techniques, creating new phishing attacks that are virtually impervious to conventional security measures. Secure sockets layer (SSL), blacklists, token-based authentication, browser same-origin policy, and monitoring / take-down services offer little protection. Even eyeballing the authenticity of a URL is unlikely to help. By leveraging cross-site scripting, the next level of phishing scams will be launched not from look-alike web pages, but instead from legitimate websites! This presentation will demonstrate how these types of attacks are being achieved. We'll also demonstrate the cutting edge exploits that can effectively turn your browser into spyware with several lines of JavaScript. And, we'll give you the steps you need to take to protect your websites from these attacks. Jeremiah Grossman is the founder and Chief Technology Officer of WhiteHat Security (http://www.whitehatsec.com), where he is responsible for web application security Rresearch and developmentD and industry evangelism. As a seven-year industry veteran and well-known security expert, Mr. Grossman is a frequent conference speaker at the BlackHat Briefings, ISSA, ISACA, NASA, and many other industry events. Mr. Grossman's research, writings, and discoveries have been featured in USA Today, VAR Business, NBC, ZDNet, eWeek, BetaNews, etc. Mr. Grossman is also a founder of the Web Application Security Consortium (WASC), as well as a contributing member of the Center for Internet Security Apache Benchmark Group. Prior to WhiteHat, Mr. Grossman was an information security officer at Yahoo!, responsible for performing security reviews on the company's hundreds of websites.