POPULARITY
Categories
From high-speed rail to electric cars to batteries to AI, it's clear that China can operate with incredible speed at massive scale. Can the US still compete?We sat down with Dan Wang, a Research Fellow at the Hoover Institution and the author of “Breakneck: China's Quest to Engineer the Future” to discuss. Timecodes: 0:00 Introduction1:36 Lawyers vs. Engineers: Cultural and Economic Differences4:06 Urban and Rural Life: Comparing Infrastructure7:20 Barriers to Progress: Regulation and Governance11:00 Industrial Policy and Public-Private Partnerships14:20 The Double-Edged Sword of Legal and Engineering Mindsets16:50 Social Engineering and Policy in China23:00 Competition, Intellectual Property, and Business Culture27:10 Manufacturing, Scale, and Global Supply Chains36:00 Lessons from Japan and Korea41:30 Complacency, Quality, and the Future of Competition48:45 Strategic Resources and Industrial Policy54:00 Foreign Policy: Engineering Diplomacy vs. Alliances59:00 Taiwan, Demographics, and the Future of US-China Relations Resources:Follow Dan on X: https://x.com/danwwangRead Dan's blog: https://danwang.co/Buy Breakneck on Amazon: https://www.amazon.com/dp/1324106034/Follow Steven on X: https://x.com/stevesi Stay Updated:Find a16z on XFind a16z on LinkedInListen to the a16z Podcast on SpotifyListen to the a16z Podcast on Apple PodcastsFollow our host: https://twitter.com/eriktorenberg Please note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Many automation software platforms including email to invoicing have artificial intelligence embedded in them. You may not think that email or invoicing software can help fight fraud in the vendor process, but yes they can and here's how... Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Free Download: 5 Steps to Improve Your Vendor Callback Process https://training.debrarrichardson.com/confirmationGet the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Which techniques and methods use by threat actors are bypassing security parametersReducing your cyber risk - using lessons learned from recent high-profile attacksStrategies to protect your service desk against identity-based attacksThom Langford, Host, teissTalkhttps://www.linkedin.com/in/thomlangford/Paul Holland, Cyber Capability Manager, Royal Mailhttps://www.linkedin.com/in/paulinfosec/Lukas Weber, Senior Vice President, AlixPartnershttps://www.linkedin.com/in/lukaswebr/Rebecca Stephenson, Specialist Lead Lecturer, Highlands Collegehttps://www.linkedin.com/in/creative-minds-in-cyber/Darren James, Senior Product Manager, Specopshttps://www.linkedin.com/in/darren-james-91055310
Adam Swart — CEO of Crowds on Demand — joins the show to reveal the mechanics on how modern movements are manufactured. He explains how fake protests, paid participants and manufactured online followers are used to seed real engagement, create the illusion of consensus, and drive actual street and media action. If you've ever wondered why certain narratives explode overnight or why social momentum sometimes feels engineered, this episode shows you the playbook.We dig into:– How organizers buy attention and simulate grassroots energy.– Why fake consensus persuades real people to act.– The tools and platforms used to manufacture reality online and on the ground.– Real-world examples and the downstream effects on media, politics, and public perception.– Practical ways listeners can spot engineered movements and protect their newsfeeds and their minds from manipulation.This is essential listening for anyone who wants to understand — and resist — the mechanics behind manufactured movements, manipulation and mind controlYou can see more at CrowdsOnDemand.com
An in-depth conversation with a ethical hacker about the perils caused by Social Engineering, data harvesting and hacking. Follow Anonymous and learn more about his services on Instagram and X:Instagram: https://www.instagram.com/anon_cysec/X: https://x.com/Code4_CyberSecWebsite: https://code4cybersecurity.com/***** Across The Socials @TheAndresSegovia & Twitter/X @_AndresSegovia https://TheAndresSegovia.com To hear more, visit theandressegovia.substack.com
Get ready for a wild ride on this episode of *The Pour Horsemen Podcast*!
Cybersecurity isn't just about firewalls and passwords anymore. It's an all-out battle where hackers run businesses with customer support desks, insider threats can be disguised as your newest hire, and artificial intelligence is both the weapon and the shield. In this special episode of IT Visionaries, host Chris Brandt switches roles and sits in the hot seat while Lacey Peace, host of Experts of Experience, interviews him about the three biggest cyber threats IT leaders must prepare for in 2025. From the rise of ransomware-as-a-service to North Korean nationals infiltrating U.S. companies, and AI reshaping the entire security landscape, Chris reveals what's really happening behind the scenes of today's most dangerous attacks. With stories from his career building high-security facilities — including an EMP-shielded data center buried under a mountain — Chris shares the lessons that every business leader needs to hear about resilience, recovery, and why it's no longer a matter of “if” but “when.” Don't miss this candid and eye-opening conversation. Watch the full episode now and learn how to protect your organization before it's too late. Key Moments: 00:00: Lacey Peace Interviews Chris Brandt04:45 Cyber Extortion and Ransomware08:17 Supply Chain Attacks18:20 Creating an Isolated Recovery Environment20:08 Threat Number Two: IT Worker Attacks22:14 The Rise of Phishing Attacks27:26 The Evolution of Social Engineering30:19 The Role of AI in Cybersecurity33:01 Challenges in Reporting Cyber Incidents33:46 The Complexity of Cyber Incident Recovery34:45 The Role of Governments in Cybersecurity -- This episode of IT Visionaries is brought to you by Meter - the company building better networks. Businesses today are frustrated with outdated providers, rigid pricing, and fragmented tools. Meter changes that with a single integrated solution that covers everything wired, wireless, and even cellular networking. They design the hardware, write the firmware, build the software, and manage it all so your team doesn't have to. That means you get fast, secure, and scalable connectivity without the complexity of juggling multiple providers. Thanks to meter for sponsoring. Go to meter.com/itv to book a demo.---Mission.org is a media studio producing content alongside world-class clients. Learn more at mission.org Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
⬥GUEST⬥Aunshul Rege, Director at The CARE Lab at Temple University | On Linkedin: https://www.linkedin.com/in/aunshul-rege-26526b59/⬥CO-HOST⬥Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead, National Institute of Standards and Technology | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥Cybersecurity Is for Everyone — If We Teach It That WayCybersecurity impacts us all, yet most people still see it as a tech-centric domain reserved for experts in computer science or IT. Dr. Aunshul Rege, Associate Professor in the Department of Criminal Justice at Temple University, challenges that perception through her research, outreach, and education programs — all grounded in community, empathy, and human behavior.In this episode, Dr. Rege joins Sean Martin and co-host Julie Haney to share her multi-layered approach to cybersecurity awareness and education. Drawing from her unique background that spans computer science and criminology, she explains how understanding human behavior is critical to understanding and addressing digital risk.One powerful initiative she describes brings university students into the community to teach cyber hygiene to seniors — a demographic often left out of traditional training programs. These student-led sessions focus on practical topics like scams and password safety, delivered in clear, respectful, and engaging ways. The result? Not just education, but trust-building, conversation, and long-term community engagement.Dr. Rege also leads interdisciplinary social engineering competitions that invite students from diverse academic backgrounds — including theater, nursing, business, and criminal justice — to explore real-world cyber scenarios. These events prove that you don't need to code to contribute meaningfully to cybersecurity. You just need curiosity, communication skills, and a willingness to learn.Looking ahead, Temple University is launching a new Bachelor of Arts in Cybersecurity and Human Behavior — a program that weaves in community engagement, liberal arts, and applied practice to prepare students for real-world roles beyond traditional technical paths.If you're a security leader looking to improve awareness programs, a university educator shaping the next generation, or someone simply curious about where you fit in the cyber puzzle, this episode offers a fresh perspective: cybersecurity works best when it's human-first.⬥SPONSORS⬥ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Dr. Aunshul Rege is an Associate Professor here, and much of her work is conducted under this department: https://liberalarts.temple.edu/academics/departments-and-programs/criminal-justiceTemple Digital Equity Plan (2022): https://www.phila.gov/media/20220412162153/Philadelphia-Digital-Equity-Plan-FINAL.pdfTemple University Digital Equity Center / Digital Access Center: https://news.temple.edu/news/2022-12-06/temple-launches-digital-equity-center-north-philadelphiaNICE Cybersecurity Workforce Framework: https://www.nist.gov/itl/applied-cybersecurity/nice/nice-framework-resource-center⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast:
If you are in this age group (or not) and looking for a job…..Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: VMF Tip of the Week Video: Is It A Scam? The BBB Scam Tracker May Be Able to Tell You https://youtu.be/y_d6QVlqcSYBBB Scam Tracker: https://www.bbb.org/scamtrackerBBB Scam HQ: https://www.bbb.org/all/scamtips BBB New Scam Alert Emails (Sign-Up): https://signup.e2ma.net/signup/1900156/1902645/Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
⬥GUEST⬥Aunshul Rege, Director at The CARE Lab at Temple University | On Linkedin: https://www.linkedin.com/in/aunshul-rege-26526b59/⬥CO-HOST⬥Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead, National Institute of Standards and Technology | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥Cybersecurity Is for Everyone — If We Teach It That WayCybersecurity impacts us all, yet most people still see it as a tech-centric domain reserved for experts in computer science or IT. Dr. Aunshul Rege, Associate Professor in the Department of Criminal Justice at Temple University, challenges that perception through her research, outreach, and education programs — all grounded in community, empathy, and human behavior.In this episode, Dr. Rege joins Sean Martin and co-host Julie Haney to share her multi-layered approach to cybersecurity awareness and education. Drawing from her unique background that spans computer science and criminology, she explains how understanding human behavior is critical to understanding and addressing digital risk.One powerful initiative she describes brings university students into the community to teach cyber hygiene to seniors — a demographic often left out of traditional training programs. These student-led sessions focus on practical topics like scams and password safety, delivered in clear, respectful, and engaging ways. The result? Not just education, but trust-building, conversation, and long-term community engagement.Dr. Rege also leads interdisciplinary social engineering competitions that invite students from diverse academic backgrounds — including theater, nursing, business, and criminal justice — to explore real-world cyber scenarios. These events prove that you don't need to code to contribute meaningfully to cybersecurity. You just need curiosity, communication skills, and a willingness to learn.Looking ahead, Temple University is launching a new Bachelor of Arts in Cybersecurity and Human Behavior — a program that weaves in community engagement, liberal arts, and applied practice to prepare students for real-world roles beyond traditional technical paths.If you're a security leader looking to improve awareness programs, a university educator shaping the next generation, or someone simply curious about where you fit in the cyber puzzle, this episode offers a fresh perspective: cybersecurity works best when it's human-first.⬥SPONSORS⬥ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Dr. Aunshul Rege is an Associate Professor here, and much of her work is conducted under this department: https://liberalarts.temple.edu/academics/departments-and-programs/criminal-justiceTemple Digital Equity Plan (2022): https://www.phila.gov/media/20220412162153/Philadelphia-Digital-Equity-Plan-FINAL.pdfTemple University Digital Equity Center / Digital Access Center: https://news.temple.edu/news/2022-12-06/temple-launches-digital-equity-center-north-philadelphiaNICE Cybersecurity Workforce Framework: https://www.nist.gov/itl/applied-cybersecurity/nice/nice-framework-resource-center⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast:
In cybersecurity, identity has become the primary attack vector. We explore identity in CXOTalk 892, with the CEO of RSA Security, Rohit Ghai, who explains how stolen credentials, social engineering, and AI-enabled impersonation break defenses. And what boards, CISOs, and executives must do now.What you'll learn:-- Why credential theft remains the #1 initial access vector and what “phishing resistant” MFA actually requires-- How attackers bypass MFA via help desk social engineering and voice impersonation, and how to stop it-- Managing identity across the joiner–mover–leaver lifecycle to close high-risk gaps-- The “assume breach” mindset: zero trust, least privilege, and blast radius reduction-- The CISO's evolving mandate: business vs. technology, board communication, and risk quantification-- AI in cyber: sword, shield, and attack surface, and the changing economics of attack vs. defense-- Ransomware beyond backups: data theft, response playbooks, and legal/PR readinessWho should watch:Board members, CEOs, CISOs, CIOs, and security leaders who seek clear actions to improve resilience without slowing the business.
Welcome back to To the Point Cybersecurity! In this episode, hosts Rachael Lyon and Jonathan Knepher continue their fascinating conversation with Dr. Margaret Cunningham, Technical Director of Security and AI Strategy at Darktrace. With a background in applied experimental psychology and deep expertise in human-centered security, Dr. Cunningham dives into the real-world challenges and opportunities facing today's cybersecurity professionals. Together, they tackle everything from the simplicity—and sometimes the limitations—of “safe words” for security, to the complexities of measuring team performance and the persistent struggle to balance risk and resilience. Dr. Cunningham challenges the industry's tendency to fixate on failures instead of celebrating successes, and she discusses the real impact AI and automation are having—both helpful and misleading—on cognitive workloads, security processes, and human expertise. Whether you're curious about the human side of security, the changing landscape of AI in cybersecurity, or are just looking for practical ways to spark positive change in your organization, this episode is packed with thought-provoking insights and actionable advice. So sit back and join us for a candid conversation that will leave you questioning how we define success in security and how we can all prepare for an AI-driven future. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e351
Cybercriminals are exploiting X's Grok AI to bypass ad protections and spread malware to millions—while researchers discover your home Wi-Fi can now monitor your heart rate. This week's news breakdown covers the attack vectors you need to know about. Join co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem as they dive into the latest cybersecurity developments that could impact your organization tomorrow. From social media malvertising to biometric data harvesting through everyday devices, these aren't distant threats—they're happening now. Key Topics Covered: How cybercriminals are weaponizing Grok AI for malvertising campaigns Why 10-15% of employees access risky content at work (and what to do about it) Wi-Fi devices that can detect heart rates from 10 feet away—privacy implications Amazon's Project Kuiper vs. Starlink: What 1GB satellite internet means for security Practical defenses: YubiKeys, browser isolation, and network redundancy strategies Don't wait until your organization is the next headline. IT leaders need to stay ahead of evolving threats, and this episode delivers critical insights to help protect your business. Like, share, and subscribe for more in-depth security discussions! #cybersecurity #infosec #grok #malware #starlink #wifi #privacy #ITsecurity
NCSAM Week 1 - Social Engineering: A Cybersecurity Perspective
I asked ChatGPT what vendor onboarding professionals have been searching for in the past week – and one of the blaring results was how to onboard vendors faster. I have five tips to speed up the vendor process….Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Vendor Process Training Center: AVM Vendor Toolkit (Substitute Forms, Vendor Banking Form)Vendor Banking Form (Separate Purchase): https://debrarrichardson.com/store/vendor-banking-form-template Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Welcome back to To the Point Cybersecurity Podcast! In this week's episode, hosts Rachael Lyon and Jonathan Knepher are joined by the brilliant Dr. Margaret Cunningham, Technical Director for Security and AI Strategy at Darktrace. With a PhD in Applied Experimental Psychology and multiple patents to her name, Dr. Cunningham is a leading voice in human-centered security, behavioral analytics, and the ever-evolving intersection of people and technology. Together, the trio dives into the fast-changing landscape of AI-driven threats—think voice cloning, deepfakes, and sophisticated social engineering attacks that challenge every notion of trust and identity. From the real-world dangers of phone scams using cloned voices, to high-profile incidents like the Coinbase insider threat and the rise of groups like Scattered Spider, you'll hear stories that illuminate both the risks and solutions shaping today's enterprise security. They explore the future (and limits) of authentication, the importance—and pitfalls—of data collection, and why behavioral analytics are more crucial than ever in spotting anomalies. Dr. Cunningham also shares insights on transparency, industry responses, and the human factors that make cybersecurity so complex and fascinating. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e350
Enjoy these back to back throwback episodes! Doors of Perception is available now on Amazon Prime!https://watch.amazon.com/detail?gti=amzn1.dv.gti.8a60e6c7-678d-4502-b335-adfbb30697b8&ref_=atv_lp_share_mv&r=webDoors of Perception official trailerhttps://youtu.be/F-VJ01kMSII?si=Ee6xwtUONA18HNLZIndependent Media Token https://www.independentmediatoken.com/Patreon https://patreon.com/forbiddenknowledgenews?utm_medium=unknown&utm_source=join_link&utm_campaign=creatorshare_creator&utm_content=copyLinkMerchhttps://fknstore.net/Start your microdosing journey with BrainsupremeGet 15% off your order here!!https://brainsupreme.co/FKN15Book a free consultation with Jennifer Halcame Emailjenniferhalcame@gmail.comFacebook pagehttps://www.facebook.com/profile.php?id=61561665957079&mibextid=ZbWKwLWatch The Forbidden Documentary: Occult Louisiana on Tubi: https://link.tubi.tv/pGXW6chxCJbC60 PurplePowerhttps://go.shopc60.com/FORBIDDEN10/or use coupon code knowledge10FKN Link Treehttps://linktr.ee/FKNlinksForbidden Knowledge Network https://forbiddenknowledge.news/ Make a Donation to Forbidden Knowledge News https://www.paypal.me/forbiddenknowledgenehttps://buymeacoffee.com/forbiddenJohnny Larson's artworkhttps://www.patreon.com/JohnnyLarsonSign up on Rokfin!https://rokfin.com/fknplusPodcastshttps://www.spreaker.com/show/forbiddenAvailable on all platforms Support FKN on Spreaker https://spreaker.page.link/KoPgfbEq8kcsR5oj9FKN ON Rumblehttps://rumble.com/c/FKNpGet Cory Hughes books!Lee Harvey Oswald In Black and White https://www.amazon.com/dp/B0FJ2PQJRMA Warning From History Audio bookhttps://buymeacoffee.com/jfkbook/e/392579https://www.buymeacoffee.com/jfkbookhttps://www.amazon.com/Warning-History-Cory-Hughes/dp/B0CL14VQY6/ref=mp_s_a_1_1?crid=72HEFZQA7TAP&keywords=a+warning+from+history+cory+hughes&qid=1698861279&sprefix=a+warning+fro%2Caps%2C121&sr=8-1https://coryhughes.org/YouTube https://youtube.com/@fknclipspBecome Self-Sufficient With A Food Forest!!https://foodforestabundance.com/get-started/?ref=CHRISTOPHERMATHUse coupon code: FORBIDDEN for discountsOur Facebook pageshttps://www.facebook.com/forbiddenknowledgenewsconspiracy/https://www.facebook.com/FKNNetwork/Instagram @forbiddenknowledgenews1@forbiddenknowledgenetworkXhttps://x.com/ForbiddenKnow10?t=uO5AqEtDuHdF9fXYtCUtfw&s=09Email meforbiddenknowledgenews@gmail.comsome music thanks to:https://www.bensound.com/Become a supporter of this podcast: https://www.spreaker.com/podcast/forbidden-knowledge-news--3589233/support.
professorjrod@gmail.comCybersecurity isn't just about firewalls and antivirus software—it's about understanding the complex interplay between technical systems and human psychology. In this continuation of our Security+ series, we explore the multifaceted world of attack surfaces, threat vectors, and social engineering techniques that cybercriminals employ.We start by breaking down what constitutes an attack surface—those vulnerable points where unauthorized users might attempt to breach your systems. From physical hardware and network components to applications and human elements, each represents a potential entry point for attackers. We then explore the pathways attackers use to exploit these vulnerabilities, from vulnerable software and network vectors to more devious approaches like lure-based and message-based vectors.The episode takes a deep dive into social engineering—the art of manipulating human behavior rather than exploiting technical flaws. Through real-world examples, including my own experience with an attempted password reset scam, we demonstrate how attackers use techniques like impersonation, pretexting, phishing, and business email compromise to bypass even the most sophisticated security systems. One of my students shared how his sister's company lost $10,000 when an attacker impersonated the vacationing CEO and requested a wire transfer—a stark reminder that human vulnerabilities often pose the greatest security risk.Whether you're studying for Security+ certification or simply want to better protect yourself and your organization, this episode provides essential insights into the psychological aspects of cybersecurity. Understanding these concepts is crucial not just for IT professionals, but for everyone who uses digital technology. Have you ever encountered a social engineering attempt? How did you recognize and respond to it?Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Do you have a non-vendor team member performing the confirmation call? I don't recommend that certain steps are put into place to reduce the potential for both internal and external fraud. What are they?Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Get the Vendor Callback Confirmation Toolkit(TM) Today: https://training.debrarrichardson.com/course/callback-confirmation-toolkitCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. In this 2025 deep-dive, David Bombal sits down with John Hammond to map the real state of hacking: classic ransomware/infostealers meet AI-assisted malware (including code that leverages LLMs). We unpack the ClickFix and FileFix social-engineering patterns, fake CAPTCHA and “save/upload” flows that trick users into running payloads, and the practical Windows mitigations (policy/registry ideas) you should know. John shares why he estimates 20–30% of attacks now have some AI touch, how social engineering scales, and where defenders can push back. For your career, he argues opportunities are expanding: use CTFs, show your work on GitHub/video, and consider OSCP for signaling. He also introduces Just Hacking Training (JHT), handson hack-alongs, archived CTFs, free upskill challenges, and pay-what-you-want courses with industry all-stars. What you'll learn: • How ClickFix/FileFix actually trick users • Realistic mitigation tactics you can apply • The current role of AI in malware • Career roadmap: CTFs → OSCP → portfolio • Where to get hands-on: JHT resources // John Hammond's SOCIALS // YouTube: / @_johnhammond X: https://x.com/_johnhammond LinkedIn: / johnhammond010 Discord: / discord Instagram: / _johnhammond TikTok: / johnhammond010 GitHub: https://github.com/JohnHammond Humble Bundle: https://www.humblebundle.com/?partner... Just Hacking Training: https://www.justhacking.com/ ClickFix Website: https://clickfix-wiki.github.io/ // YouTube video REFERENCE // Linux got hacked with this AI Image: • Linux got Hacked with this AI image! Hackers trick everyone to run malware (FileFix): • hackers trick everyone to run malware (Fil... OSINT Tools to track you down: • OSINT tools to track you down. You cannot ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:58 - Intro & Current State of Hacking 03:42 - Brilliant Advert 05:14 - The Wave of AI Attacks 07:43 - Click(Fix) Hack 10:10 - FileFix: The Future Hacks 11:14 - Current Affairs & Social Engineering 15:17 - Raising Awareness 19:18 - Security Research 20:51 - Is There a Future for Younger People in This Industry? 22:54 - What Should I Do to Get There? 24:11 - Recommended Certifications 26:34 - Where Do I Start? 28:26 - About John Hammond's Work 31:12 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
"If we ever get to the point where nobody's arguing about Bitcoin, I would be afraid that that's because nobody cares anymore and Bitcoin is actually dead or dying." In this episode of THE Bitcoin Podcast, Bitcoin technologist Jameson Lopp (Casa co-founder & CSO) joins Walker America to cut through today's Bitcoin noise: filter wars, spam on Bitcoin, standardness vs. consensus, the real risks (social engineering vs wrench attacks), and how to actually secure generational wealth with family multi-sig. We also dive into the quantum computing threat—timelines, soft-fork options, migration game theory, and why coordination (not cryptography alone) will be the hard part. Plus: culture/politics, ossification, and how debates keep Bitcoin antifragile. FOLLOW JAMESON: NOSTR: https://primal.net/lopp X: https://x.com/lopp WEB: https://www.lopp.net/ If you enjoy THE Bitcoin Podcast you can help support the show by doing the following: FOLLOW ME (Walker) on @WalkerAmerica on X | @TitcoinPodcast on X | Nostr Personal (walker) | Nostr Podcast (Titcoin) | Instagram Subscribe to THE Bitcoin Podcast (and leave a review) on Fountain | YouTube | Spotify | Rumble | EVERYWHERE ELSE ***** THE Bitcoin Podcast Partners: > http://bitbox.swiss/walker -- use promo code WALKER for 5% off the Bitcoin-only Bitbox02 hardware wallet. > GET FOLD ($10 in bitcoin): https://use.foldapp.com/r/WALKER
Is racial profiling always wrong, even if used by an AI to decrease crime? Should we use AI to judge criminal cases, recommend sentences for the guilty, or decide parole for prisoners?Chapters:[00:00] Introduction to AI in Crime Fighting[00:12] Thought Experiment: The Looting Scenario[06:32] Predictive Policing and AI[10:13] Debating the Ethics of AI in Law Enforcement[23:26] Affirmative Action and Racial Profiling[37:51] Balancing Crime Reduction and Social Engineering[39:00] AI in Sentencing: Benefits and Challenges[40:08] Algorithmic Transparency and Legal Implications[43:15] The Opaque Jury Argument[47:44] Fairness vs. Accuracy in Legal Decisions[57:25] Philosophical Implications of Opaque Decision-Making
Free speech is under attack in almost every country on the planet. Google, YouTube, and Big Tech are working with powerful figures behind the scenes to limit what you can see, hear, and read—an attempt to steer your thoughts, your spending, and your sovereignty. Tech entrepreneur Ray Vahey, founder of BitChute, joins me to share his journey fighting to keep the internet free for your children and mine.You can support his misstion at https://Bitchute.com
Tariffs are here and many vendor team members may be busier than ever with how they have caused changes in the vendor process. There may be additional validations involved in four areas…Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Don't let your small business fall victim to devastating cyber attacks! Expert joins us t discuss AI Risks exposed. We explore how hackers use AI to target small businesses. From AI Social engineering to data theft, learn what you need to know to protect your business from cyber threats. Send us a textGrowth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show
Cybersecurity Today: Navigating AI Advancements and Future Trends In this episode of 'Cybersecurity Today,' host Jim Love and panelists Tammy Harper, Laura Payne, and David Shipley discuss recent developments in cybersecurity, shifting focus to AI's impact on the industry. They explore emerging threats such as AI-generated ransomware and the efficiency of exploiting vulnerabilities using AI. The conversation emphasizes the need for improved policy and regulation, the role of MFA in safeguarding systems, and the implications of youth unemployment due to AI disruption. Predictions for the coming year include the necessity for better legislation, ethical considerations in AI deployment, and the continued importance of maintaining fundamental cybersecurity measures amidst rapid technological advances. 00:00 Introduction and Overview 00:36 Meet the Panelists 02:32 New Cybersecurity Awareness Platform 05:07 Biometric Guidance and Privacy 13:04 AI-Driven Exploits and Security Challenges 22:21 Hack Back Legislation Debate 30:21 MFA Implementation and Insurance Implications 36:30 Understanding the Role of Underwriting in Insurance 36:58 The Importance of Cybersecurity in Insurance 37:43 Scenarios and Broker Consultations 38:57 The Scattered Spiders and Cybersecurity Threats 43:07 Youth Unemployment and Cybersecurity 44:43 The Rise of Social Engineering 47:47 AI and Its Implications 49:28 The Future of AI and Cybersecurity 50:45 Challenges and Solutions in AI Security 51:09 Final Thoughts and Recommendations
I discuss the hiring practices of the Talawanda School District and their failure to engage in proper background checks and how this led to the hiring of a sexual deviant named Joseph Hall, to be the director of student services. I also discuss the Minneapolis False Flag and the actors present, the social engineering of the week and other education news. Book Websites: https://www.moneytreepublishing.com/shop PROMO CODE: “AEFM” for 10% OFF https://armreg.co.uk PROMO CODE: "americaneducationfm" for 15% off all books and products. (I receive no kickbacks). Q posts book: https://drive.proton.me/urls/JJ78RV1QP8#yCO0wENuJQPH
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up, this time involving a surprising new flock of chickens and a listener note from Belgium. Via Peter Janssen, as he's seen the same fake “employee discount” scams we covered, only this time targeting backpacks and other products. Dave's story is on a new “podcast imposter” scam, where fake invites trick business owners and influencers into giving remote access so attackers can hijack their accounts. Joe's got a story on Workday disclosing a breach after attackers used social engineering to infiltrate a third-party CRM system, and why this matters given Workday's wide use as the front end for so many companies' HR departments. Maria brings two quick hits this week: a fake FedEx text scam making the rounds, and a look at whether covering kids' faces with emojis in photos really protects their privacy — or if it's more illusion than protection. On today's catch of the day, Dave got a text claiming he's been recommended for a high-paying, no-experience-needed YouTube job—classic signs of a scam promising easy money and “free training.” Complete our annual audience survey before August 31. Resources and links to stories: Dumbest Friend Just Bought 20 Chickens Executives Warned About Celebrity Podcast Scams Workday Discloses Data Breach Following CRM-Targeted Social Engineering Attack Will covering your child's face with an emoji actually protect their privacy? Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.
If you're looking for a low-cost vendor validation step to deter fraud – I have one for you in today's episode. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Article: How to Vet Suppliers and Avoid Fake Vendor Scams https://www.bitdefender.com/en-gb/blog/hotforsecurity/how-to-vet-suppliers-and-avoid-fake-vendor-scamsCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Prepare to have your perception of reality shattered as we dive deep into Adam Curtis's mind-bending revelation about how power structures have created a fake world. Through classified documents, whistleblower testimonies, and hidden historical connections, we expose how banks, politicians, and tech giants have constructed an artificial reality to maintain control. From the rise of algorithmic manipulation to the manufactured consent of modern media, discover how society has been deliberately pushed into accepting a fabricated version of truth. This explosive episode reveals the hidden architects behind our synthetic reality, the psychological warfare being waged on global consciousness, and how the very fabric of our perceived world has been carefully engineered to keep humanity in a perpetual state of confusion and compliance.
NATO wants to add “security forces in Ukraine. Why? For a false flag to then attack Russia? Time will tell. Also, more declasses are coming. I also talk tax exemptions, schools use of Yonder pouches for cell phones, the money that is wasted and how it's larger-scale social engineering. New Substack article too. Book Websites: https://www.moneytreepublishing.com/shop PROMO CODE: “AEFM” for 10% OFF https://armreg.co.uk PROMO CODE: "americaneducationfm" for 15% off all books and products. (I receive no kickbacks). Q posts book: https://drive.proton.me/urls/JJ78RV1QP8#yCO0wENuJQPH
Validating vendor information and checking that they are not on any applicable sanction lists is a part of your vendor on-boarding process, but what about after the on-boarding process? Today's episode is a webinar that not only has a five-step process for recurring vendor validations, but lots of five downloads to help you get started. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: On-Demand Webinar: Recurring Vendor Validations: Ensure Post-Onboarding Compliance https://training.debrarrichardson.com/course/september2024Free Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
At DEF CON's Social Engineering Village, contestants have 22 minutes to charm real employees at real companies into revealing real details that could lead to a breach. We step inside the booth to see how persuasion, improv, and psychology fuel both ethical hacking and the rise of cybercrime worldwide. Learn more about your ad choices. Visit megaphone.fm/adchoices
Dr Drew, coming-of-age icon for Generation X, joins the program to examine the profound cultural changes shaping our world. We discuss what these shifts mean for our future—and how they're fundamentally impacting young people in ways that cannot be ignored. From the crushing economic conditions facing the younger generation to the unrealistic expectations society places on them, Dr. Drew breaks down the cultural and financial pressures fueling today's mental health crisis. This is a powerful, insightful conversation you won't want to miss.Follow Dr. Drew at https://DrDrew.com
Glenn and Eric Meder return for another powerful and eye-opening conversation—this time diving into one of the most fundamental freedoms under attack: your free will. In this episode, we break down how manipulation of the masses—through propaganda, surveillance, engineered scarcity, and social conditioning—is being used to strip you of your options. And when your options are taken away, your free agency disappears. Free will cannot exist without choice.We also explore how modern social constructs, from gender ideology to algorithmic censorship and digital nudging, are being used to reshape the minds of children and adults alike. It's all part of a broader plan to fragment identity, dissolve autonomy, and normalize submission to centralized control. Glenn and Eric—two deeply knowledgeable experts on the weaponization of the surveillance state—lay out how this system was built, how it's being deployed, and what you can do to reclaim your sovereignty. This is not just about technology. It's about you, your children, and the future of human freedom.Sign up for the FREE “Exit the Surveillance State” Webinar:https://event.webinarjam.com/register/306/8yo53fqk
A vendor in your vendor master file is inactive – and for good reason, because the last time your company paid that vendor was four years ago. Now your company wants to use that vendor again – don't just change the status that can lead to failed payments and bad vendor data. Why and what should you do instead? `Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Training Session: Build a Substitute W-9 Form to Combine Your Vendor Setup Form and IRS Form W-9 https://training.debrarrichardson.com/course/substitute-irs-w9Training Session: Build a Substitute W-8BEN and W-8BEN-E FormFree On-Demand Webinar: 8 Steps to Clean Your Vendor Master File https://training.debrarrichardson.com/course/cleanupFree Download: Vendor Validation Reference List with Resource Links https://debrarrichardson.com/vendor-validation-downloadCustomized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Social engineering attacks are becoming more sophisticated, and this episode of The Backup Wrap-up explores real-world tactics through our Mr. Robot series analysis. Curtis and Prasanna examine how social engineering works, from Instagram stalking to phone compromise, and discuss actual ransomware groups like Scattered Spider who use social engineering to impersonate employees and reset passwords. We break down the hospital hacking scene, revealing how underfunded IT departments create vulnerabilities that social engineering attacks exploit. The episode also covers email security, backup system risks, and the Sony hack parallels shown in the series. Learn how to protect your organization from social engineering by understanding what information to keep private, how to properly fund cybersecurity, and why your backup systems need protection from social engineering tactics.
Did you know that the IRS has working group meetings for the Information Returns Intake System (IRIS)? To find out three things I learned when I attended, what the IRS says FIRE users should do now and how you can attend the next one..Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: YouTube Video: Demo of the IRS e-News Subscriptions IRS: IRIS working group meetings and notes Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
On the Schmooze Podcast: Leadership | Strategic Networking | Relationship Building
I'm pleased to interview one of our Biz Book Pub Hub Partners. Our Hub Partners are experts who support entrepreneurs along their author journey. Today's guest is a book marketing strategist. If book marketing feels like a never-ending to-do list, you're not alone. She works with nonfiction authors—especially business owners, coaches, and consultants—who want to grow their impact and income through their books without feeling like they've sold their soul to sales. Instead of chasing short-term accolades like bestseller status, she helps authors shift toward strategies that feel good and build long-term results: clarifying their message, deepening reader relationships, and building community around their ideas. Through her Buzzworthy Book Experience and signature BEES Marketing Method, she helps authors create visibility, authority, and income, with strategies that feel authentic, not exhausting. Her approach centers on simplicity and alignment with your values, whether you're launching your first book or reimagining your next move. Please join me in welcoming Judy Baker. In this episode, we discuss the following:
Ethical hacker Rachel Tobac joins us to answer a juicy question: How would she hack someone reasonably security savvy like Matt?
Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology. In today's episode, Chris and Abbie explore the complexities of attraction and the concept of love at first sight. They discuss the biochemical responses associated with attraction, the importance of understanding cognitive biases, and the role of familiarity in relationships. [Aug 4, 2025] 00:00 - Intro 00:35 - Dr. Abbie Maroño Intro 01:15 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:14 - The Topic of the Day: Love at First Sight 03:22 - Pulling Apart the Fairy Tale 04:26 - Knowledge is Power 05:49 - Why Can't This Be Love? 07:12 - More Than a Feeling 09:28 - May Impair Your Ability 10:59 - The Rickety Bridge Study 13:20 - Head or Heart? 15:04 - Cognitive Biases 16:16 - The Halo Effect 17:19 - Prototypical Matching 18:51 - I Want You to Want Me 21:54 - Retrospective Bias 23:34 - Feels Like Home 28:44 - Keep One Eye Open 30:32 - A Responsibility to Self-Awareness 32:53 - Wrap Up 33:11 - Next Month: Intuition 33:31 - Outro - www.social-engineer.com - www.innocentlivesfoundation.org Find us online: - LinkedIn: linkedin.com/in/dr-abbie-maroño-phd - Instagram: @DoctorAbbieofficial - LinkedIn: linkedin.com/in/christopherhadnagy References: Dutton, D. G., & Aron, A. P. (1974). Some evidence for heightened sexual attraction under conditions of high anxiety. Journal of Personality and Social Psychology, 30(4), 510–517. Fisher, H. E., Aron, A., & Brown, L. L. (2006). Romantic love: A mammalian brain system for mate choice. Philosophical Transactions of the Royal Society B: Biological Sciences, 361(1476), 2173–2186. Fletcher, G. J. O., Simpson, J. A., & Thomas, G. (2000). The measurement of perceived relationship quality components: A confirmatory factor analytic approach. Personality and Social Psychology Bulletin, 26(3), 340–354. Hazan, C., & Shaver, P. (1987). Romantic love conceptualized as an attachment process. Journal of Personality and Social Psychology, 52(3), 511–524. Marazziti, D., & Canale, D. (2004). Hormonal changes when falling in love. Psychoneuroendocrinology, 29(7), 931–936. Nisbett, R. E., & Wilson, T. D. (1977). The halo effect: Evidence for unconscious alteration of judgments. Journal of Personality and Social Psychology, 35(4), 250–256. Sprecher, S., & Metts, S. (1989). Development of the "Romantic Beliefs Scale" and examination of the effects of gender and gender-role orientation. Journal of Social and Personal Relationships, 6(4), 387–411. Sternberg, R. J. (1986). A triangular theory of love. Psychological Review, 93(2), 119–135. Zeki, S. (2007). The neurobiology of love. FEBS Letters, 581(14), 2575–2579. Zsok, F., Haucke, M., De Wit, C., & Barelds, D. P. (2017). What kind of love is love at first sight? An empirical investigation. Personal Relationships, 24(4), 869–885.
If a co-worker or colleague contacted you on social media – how do you tell if it's them or not?Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team. Links mentioned in the podcast + other helpful resources: Free Authentication Training: 3 Step Vendor Setup & Maintenance Process WorkshopBloomberg Article: ‘I Need to Identify You': How One Question Saved Ferrari From a Deepfake Scam Customized Vendor Validations Session: https://debrarrichardson.com/vendor-validation-sessionVendor Process Training Center - https://training.debrarrichardson.comCustomized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training Free Live and On-Demand Webinars: https://training.debrarrichardson.com/webinarsVendor Master File Clean-Up: https://www.debrarrichardson.com/cleanupYouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas? Email me at debra@debrarrichardson.com Music Credit: www.purple-planet.com
Learn how social engineering attacks really work by analyzing the cybersecurity lessons from Mr. Robot's pilot episode. Curtis Preston and Prasanna Malaiyandi break down real-world social engineering tactics used by cybercriminals to manipulate victims into revealing sensitive information.This episode covers social engineering phone scams targeting even cybersecurity professionals, the dangers of AI-powered voice cloning in modern attacks, and practical defense strategies. Discover why security questions should never be answered truthfully, how to verify suspicious calls claiming to be from banks or family members, and the importance of "trust but verify" principles.The hosts also examine insider threats in cybersecurity firms, discuss the role of OSINT (Open Source Intelligence) in attacks, and explain honeypot detection systems. Plus, learn about proper backup storage security and why offsite, air-gapped backups remain critical for ransomware protection. Get actionable tips to protect yourself and your organization from increasingly sophisticated social engineering schemes.Disclaimer: The Backup Wrap-up is not affiliated with the Mr. Robot show nor the network on which it airs. But we think you should go watch it!
This is repeat of a broadcast from last October, still relevant, especially in the light of so many current breaches which have begun not with technical weaknesses but with phishing and social engineering. In this deeper dive episode of 'Cybersecurity Today,' hosts Jim Love and David Shipley, a top cybersecurity expert from Beauceron Security, explore the evolution, intricacies, and impact of phishing attacks. They highlight recent sophisticated phishing strategies that combine AI, complex setups, and psychological manipulation to deceive even the most knowledgeable individuals. The discussion covers various types of phishing including spearphishing, whaling, sharking, QR phishing, and the emotional and psychological tactics employed by attackers. They also delve into practical defense mechanisms such as Multi-Factor Authentication (MFA), passkeys, and the importance of fostering a security-conscious workplace culture. The episode emphasizes the need for a diversified security approach involving technology, training, and emotional intelligence, while encouraging assertiveness in questioning potentially fraudulent communication. 00:00 Introduction to Cybersecurity Today 00:40 The Evolution of Phishing Attacks 01:44 Deep Dive into Phishing Techniques 03:31 History of Phishing 06:04 Types of Phishing: From Email to Whaling 10:06 Advanced Phishing Tactics 19:25 The Psychology Behind Phishing 26:03 Phishing Tactics: Free Gift Card Scams 26:33 The Power of Scarcity in Phishing 28:27 Authority and Phishing: Impersonation Tactics 29:11 Consistency: Small Requests Leading to Big Scams 30:14 Liking and Social Proof in Social Engineering 32:15 The Evolution of Phishing Techniques 35:31 The Role of MFA in Enhancing Security 38:35 Passkeys and the Future of Authentication 44:57 Building a Security-Conscious Workplace Culture 48:47 Conclusion and Final Thoughts
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Trent Waterhouse. Trent is the CMO of GlobalMeet, a leading virtual event technology company with a scalable, flexible, and secure hybrid event streaming platform built and supported by experienced event experts. Trent has a proven track record of driving growth and innovation with 35 years of expertise leveraging a field sales marketing model that aligns sales, marketing, and R&D to think like a customer, act like a partner, and measure success through customer satisfaction and net promoters. Built for growth, Trent's unique blend of technology understanding and B2B marketing skills have been proven to help companies grow revenue profitably, improve customer experiences, build new partnerships, and expand opportunity pipelines. [July 21, 2025] 00:00 - Intro 00:50 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 02:30 - Trent Waterhouse Intro 03:11 - Starting Out Pre-Video 04:53 - A Brave New World 08:07 - Going Public 10:21 - Rise of the DeepFakes 13:03 - Video Watermarking 15:23 - A Simple Warning Will Do 19:11 - Staying Up to Date 21:22 - Insider Threat 23:42 - Find Trent Waterhouse Online - Website: https://www.globalmeet.com/ - Instagram: https://www.instagram.com/globalmeet/ - LinkedIn: https://www.linkedin.com/in/trentonwaterhouse/ 24:44 - Book Recommendations - Pattern Breakers - Mike Maples, Jr, Peter Ziebelman 27:16 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
In this episode of Cybersecurity Today, host David Shipley discusses several pressing cybersecurity issues. First, popular NPM Linter packages were hijacked via phishing to spread malware, affecting millions of downloads. Concurrently, Ukrainian CERT uncovers new phishing campaigns tied to APT28 using large language models for command and control. Microsoft discontinues the use of China-based engineers for US Department of Defense systems following a controversial report. Lastly, social engineering, facilitated by AI, becomes a greater threat than zero-day exploits. The episode emphasizes the need for stronger maintainer security, multifactor authentication, and a comprehensive understanding of social engineering risks. 00:00 Introduction - 10 Million Downloads 01:30 NPM Linter Packages Hijacked 05:05 Social Engineering and AI in Cybersecurity 08:57 Microsoft's China-Based Engineers Controversy 12:15 The Real Threat: Social Engineering 16:39 Conclusion and Call to Action
Send us a textThis is the interview only portion of our original episode #93 .Patrick Wood is a leading and critical expert on Sustainable Development, Green Economy, Agenda 21, 2030 Agenda and historic Technocracy.He is the author of Technocracy Rising: The Trojan Horse of Global Transformation (2015) and co-author of Trilaterals Over Washington, Volumes I and II (1978-1980) with the late Antony C. Sutton.Wood remains a leading expert on the elitist Trilateral Commission, their policies and achievements in creating their self-proclaimed “New International Economic Order” which is the essence of Sustainable Development on a global scale.An economist by education, a financial analyst and writer by profession and an American Constitutionalist by choice, Wood maintains a Biblical world view and has deep historical insights into the modern attacks on sovereignty, property rights and personal freedom. Such attacks are epitomized by the implementation of U.N. policies such as Agenda 21, Sustainable Development, Smart Growth and in education, the widespread adoption of Common Core State Standards.Wood is a frequent speaker and guest on radio shows around the nation. His current research builds on Trilateral Commission hegemony, focusing on Technocracy, Transhumanism and Scientism, and how these are transforming global economics, politics and religion.Patrick's website https://www.technocracy.news/SUPPORT THE SHOWBuy Me A Coffee http://buymeacoffee.com/DangerousinfopodcastSubscribeStar http://bit.ly/42Y0qM8Super Chat Tip https://bit.ly/42W7iZHBuzzsprout https://bit.ly/3m50hFTPaypal http://bit.ly/3Gv3ZjpPatreon http://bit.ly/3G3 SMART is the acronym that was created by technocrats that have setup the "internet of things" that will eventually enslave humanity to their needs. Support the showCONNECT WITH USWebsite https://www.dangerousinfopodcast.com/Guilded Chatroom http://bit.ly/42OayqyEmail the show dangerousinfopodcast@protonmail.comJoin mailing list http://bit.ly/3Kku5YtSOCIALSInstagram https://www.instagram.com/dangerousinfo/Twitter https://twitter.com/jaymz_jesseGab https://gab.com/JessejaymzTruth Social https://truthsocial.com/@jessejaymzWATCH LIVE YouTube https://www.youtube.com/@DANGEROUSINFOPODCASTRumble https://rumble.com/c/DangerousInfoPodcast Twitch https://www.twitch.tv/dangerousinfopodcastPilled https://pilled.net/profile/144176Facebook https://www.facebook.com/DangerousInfoPodcast/BitChute: https://www.bitchute.com/channel/egnticQyZgxDCloutHub https://clouthub.com/DangerousINFOpodcastDLive https://...
Why is AI failing at basic accounting tasks while claiming to outsmart PhD students? Blake and David dive into the stark reality of AI implementation in accounting, from Ramp's promising new expense management agents to QuickBooks' baffling suggestion to credit and debit the same account. You'll discover the critical security vulnerabilities in AI systems and learn why clients are increasingly using AI to fact-check their accountants' advice. Plus, get a comprehensive breakdown of the top 10 tax planning opportunities in the One Big, Beautiful Bill Act—from permanent 100% bonus depreciation to Trump accounts for children. The hosts also explore which companies will be AI's biggest losers and why the future of accounting lies in financial management, not advisory services.SponsorsOnPay - http://accountingpodcast.promo/onpayCloud Accountant Staffing - http://accountingpodcast.promo/casChapters(00:30) - The Big Beautiful Bill: Tax Provisions Overview (01:53) - AI in Accounting: RAMP's New AI Agents (02:56) - QuickBooks AI Agents: Frustrations and Feedback (06:05) - RAMP's AI Agents: Features and Benefits (14:38) - AI's Impact on Employment: Winners and Losers (20:54) - Grok 4: The Future of AI in Accounting (36:53) - Juno and Tax Prep Automation (37:52) - The Rise of AI in Cyber Attacks (38:26) - Social Engineering and AI (39:18) - Hidden AI Prompts in Academic Papers (41:25) - AI Security Risks and Internal Controls (45:45) - The Accountant's Labor Shortage (46:59) - Tax Planning Opportunities in the New Bill (56:29) - The Impact of the New Tax Bill (01:00:45) - Final Thoughts and Wrap-Up Show NotesRamp agents: Let finance teams do finance https://ramp.com/blog/ramp-agents-announcementMicrosoft shares $500M in AI savings internally days after cutting 9,000 jobshttps://techcrunch.com/2025/07/09/microsoft-shares-500m-in-ai-savings-internally-days-after-cutting-9000-jobs/Indeed, Glassdoor to lay off 1300 staff amid AI pushhttps://techcrunch.com/2025/07/11/indeed-glassdoor-to-lay-off-1300-staff/Workday Stock Takes A Hit After Piper Sandler Survey Flags AI-Driven Headwinds, But Retail's Optimistic https://stocktwits.com/news-articles/markets/equity/workday-stock-takes-a-hit-after-piper-sandler-survey-flags-ai-driven-headwinds/ch8GfqaR5kYElon Musk's xAI launches Grok 4 alongside a $300 monthly subscription https://techcrunch.com/2025/07/09/elon-musks-xai-launches-grok-4-alongside-a-300-monthly-subscription/Hidden AI prompts in academic papers spark concern about research integrity https://www.japantimes.co.jp/news/2025/07/04/japan/ai-research-prompt-injection/Tax provisions in the One Big Beautiful Bill Act https://www.journalofaccountancy.com/news/2025/jun/tax-changes-in-senate-budget-reconciliation-bill/Need CPE?Get CPE for listening to podcasts with Earmark: https://earmarkcpe.comSubscribe to the Earmark Podcast: https://podcast.earmarkcpe.comGet in TouchThanks for listening and the great reviews! We appreciate you! Follow and tweet @BlakeTOliver and @DavidLeary. Find us on Facebook and Instagram. If you like what you hear, please do us a favor and write a review on Apple Podcasts or Podchaser. Call us and leave a voicemail; maybe we'll play it on the show. DIAL (202) 695-1040.SponsorshipsAre you interested in sponsoring The Accounting Podcast? For details, read the prospectus.Need Accounting Conference Info? Check out our new website - accountingconferences.comLimited edition shirts, stickers, and other necessitiesTeePublic Store: http://cloudacctpod.link/merchSubscribeApple Podcasts: http://cloudacctpod.link/ApplePodcastsYouTube: https://www.youtube.com/@TheAccountingPodcastSpotify: http://cloudacctpod.link/SpotifyPodchaser: http://cloudacctpod.link/podchaserStitcher: http://cloudacctpod.link/StitcherOvercast: http://cloudacctpod.link/OvercastClassifiedsREFRAME 2025 - http://accountingpodcast.promo/reframe2025Want to get the word out about your newsletter, webinar, party, Facebook group, podcast, e-book, job posting, or that fancy Excel macro you just created? Let the listeners of The Accounting Podcast know by running a classified ad. Go here to create your classified ad: https://cloudacctpod.link/RunClassifiedAdTranscriptsThe full transcript for this episode is available by clicking on the Transcript tab at the top of this page
Dr. Joshua N. Weiss discusses the major misconceptions surrounding negotiations—and offers five steps to build your confidence and resilience as a negotiator.— YOU'LL LEARN — 1) The big negotiation mistake most people make2) The mental reframe that helps you negotiate better3) The five-step strategy to reviving stalled negotiationsSubscribe or visit AwesomeAtYourJob.com/ep1074 for clickable versions of the links below. — ABOUT JOSH — Dr. Joshua N. Weiss is a renowned negotiation and conflict resolution and leadership expert. As a Senior Fellow at the Harvard Negotiation Project and co-founder of the Global Negotiation Initiative at Harvard University, Dr. Weiss brings unparalleled expertise to his field. He also directs the MS in Leadership and Negotiation program at Bay Path University and runs a private consulting firm, offering tailored negotiation and conflict resolution, and leadership solutions for businesses, organizations, international entities, governments, and individuals. • Book: Getting Back to the Table: 5 Steps to Reviving Stalled Negotiations• Book: The Book of Real-World Negotiations: Successful Strategies From Business, Government, and Daily Life• Study: “Trajectories Toward Peace: Mediator Sequencing Strategies in Intractable Communal Conflicts”• Website: JoshuaNWeiss.com — RESOURCES MENTIONED IN THE SHOW — • Book: Getting to Yes: Negotiating Agreement Without Giving In by William Ury and Robert Fisher• Book: Negotiating the Nonnegotiable: How to Resolve Your Most Emotionally Charged Conflicts by Daniel Shapiro• Book: The Tipping Point: How Little Things Can Make a Big Difference by Malcolm Gladwell • Book: Blink: The Power of Thinking Without Thinking by Malcolm Gladwell • Book: David and Goliath: Underdogs, Misfits, and the Art of Battling Giants by Malcolm Gladwell • Book: Revenge of the Tipping Point: Overstories, Superspreaders, and the Rise of Social Engineering by Malcolm Gladwell— THANK YOU SPONSORS! — • Strawberry.me. Claim your $50 credit and build momentum in your career with Strawberry.me/Awesome• Plaud.ai. Use the code AWESOME and get a discount on your order• Rula. Connect with quality therapists and mental health experts who specialize in you at Rula.com/AwesomeSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
The next time you or your kids get a shot at the doctor's office or face anything that you know is going to be painful, there is a little trick you can use that should reduce the pain substantially. Listen as I explain what it is. https://www.newscientist.com/article/dn27514-hold-your-breath-to-dampen-the-pain-of-an-injection/#.VVTKyZO_Heb What is it about persuasive people? They just have that “something” that makes us want to listen, to be around them, and in many cases, do what they ask. Why are some people more persuasive than others? What strategies can we all use to be more influential and persuasive. Here to offer some great insight into the workings of persuasion is Abbie Maroño. She is a scientist and a practitioner in the field of human behavior and is recognized by the US Department of State as being in the top 1% of behavior analysis experts. She has delivered specialized behavioral analysis training to the U.S. Secret Service, FBI, Department of Homeland Security, and local law enforcement agencies. She is author of the book The Upper Hand: Mastering Persuasion and Getting What You Want with the Science of Social Engineering (https://amzn.to/4jwGF59) Did you know that compared to many other species, humans have a high rate of genetic diseases. Wouldn't you think by now that evolution and "survival of the fittest" would've weeded those out? What science has recently discovered, about DNA and genetics is astonishing and is helping us understand how genetics work, how diseases are passed on, how genes can mutate and make us sick, why we have such a high rate of genetic diseases and how we may soon be able to fix or prevent some of it. Joining me to discuss this is Lawrence Hurst. He is a professor of evolutionary genetics at the Milner Centre for Evolution at the University of Bath and author of the book, The Evolution of Imperfection: The Science of Why We Aren't and Can't Be Perfect (https://amzn.to/3ZgOjJS) There are things in your kitchen you need to get rid of. Over time we bring things into the kitchen that we never need, never use that take up a lot of valuable space. Listen as I offer some suggestions on what you can get rid of right now with no regret whatsoever. https://www.delish.com/food/a63527523/6-things-you-should-never-keep-on-your-kitchen-counter-according-to-organizational-experts/ PLEASE SUPPORT OUR SPONSORS!!! MINT MOBILE: Get your summer savings and shop premium wireless plans at https://MintMobile.com/something ! FACTOR: Factor meals arrive fresh and ready to eat, perfect for your summer lifestyle! Get 50% off at https://FactorMeals.com/something50off ROCKET MONEY: Cancel your unwanted subscriptions and reach your financial goals faster! Go to https://RocketMoney.com/SOMETHING QUINCE: Stick to the staples that last, with elevated essentials from Quince! Go to https://Quince.com/sysk for free shipping on your order and 365 day returns! INDEED: Get a $75 sponsored job credit to get your jobs more visibility at https://Indeed.com/SOMETHING right now! DELL: Introducing the new Dell AI PC . It's not just an AI computer, it's a computer built for AI to help do your busywork for you! Get a new Dell AI PC at https://Dell.com/ai-pc Learn more about your ad choices. Visit megaphone.fm/adchoices