If you can never get enough true crime... Congratulations, you’ve found your people.
…
continue reading
Deep dive into true crime… where real life can be stranger than fiction! Let me know if there’s any cases you’d like to hear about! You can reach me at TrueCrimeJunkie01@gmail.com
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Home of the Vigilance Newsletter, the latest Cyber News from the Dark web, research and insider info. We interview Leaders, share True Cyber Crime and provide advice on how to advance your career. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Hey there, Tax Crime Junkies! For those of you who are new to our show, Tax Crime Junkies is the true crime podcast that combines our love of taxes and crime, and we’re here to bring you the inside scoop on some of the most fascinating tax-related cases out there. As tax experts and practitioners ourselves, Dom and Tom are uniquely qualified to uncover the most intricate details of these cases, and we’re not afraid to go deep. We know the ins and outs of the tax system, and we’re passionate ...
…
continue reading
A deep-dive into Netflix's Abducted in Plain Sight Cover art photo provided by David von Diemar on Unsplash: https://unsplash.com/@davidvondiemar
…
continue reading
1
How to Save Yourself. Ransomware, Back ups and more.
59:33
59:33
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
59:33
Great discussion with Gabe Gambill. VP with Quorum. Topics discussed: best ways to limit cyber attack liability, brand protection with identification authentication, how to limit liability from cyber attacks, newest findings on ransomware cyber crime gangs, undercover findings on ransomware cyber crime gangs, pitfalls of data back ups, how to reduc…
…
continue reading
1
MYSTERIOUS DEATH OF: Franchesca Alvarado
46:40
46:40
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
46:40
When 22-year-old Franchesca Alvarado set out on a quick weekend trip to Atlantic City in March of 2012, it was meant to be a simple getaway… but it spiraled into a baffling tragedy. Her family is hoping that someone out there has the answers they’ve been searching for. If you have any information about Franchesca Alvarado, please contact the New Je…
…
continue reading
1
Episode 37 JUST WHEN YOU THINK YOU KNOW A PERSON: ALAN FABIAN’S SAVVY SCHEME
36:28
36:28
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
36:28
Show Notes for Tax Crime Junkies: "Just When You Think You Know a Person: Alan Fabian’s Savvy Scheme" Episode Summary: In this eye-opening episode of Tax Crime Junkies, your hosts Dominique and Tom delve into the complex and shocking world of Alan Fabian. A seemingly perfect citizen, family man, and business mogul, Alan's life took a dark turn into…
…
continue reading
1
Lawyer's Unleashed. Top Ways to Reduce Risk in Cyber Breach Litigation.
1:04:47
1:04:47
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:04:47
Jamey Davidson, Partner at international law firm O’Hagan Meyer (https://ohaganmeyer.com). Jamey concentrates on top ways to reduce risk in cyber breach litigation, defending businesses in cyber breach class-action law suits and how to build defenses to reduce cyber breach liability. We discuss: · How Cyber Breach Litigation Works · Why Security La…
…
continue reading
From Rupert Murdoch's global entertainment ambition to a dead hacker found hanging from a tree in a park in Germany, this true cyber crime story spans over a decade in the cut-throat Satellite TV wars, involving colorful characters, pirates, big business, technology advances and failures and those who entered the darker side to try and get what the…
…
continue reading
1
The Story Behind the Sony Data Breach 2014
48:54
48:54
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
48:54
Par Cyber Crime Junkies by David Mauro
…
continue reading
1
New Ways to Take Control Over Data Privacy with Kurt Long.
57:53
57:53
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
57:53
Kurt Long CEO and founder of BUNKR (https://www.bunkr.life/) an affordable all-in-one app with secure messaging, password management, and secure file storage. We discuss new approaches to safe and private messaging apps, how to keep criminals out of your private data, and why online privacy is important to freedom. Chapters 01:09 Kurt Long's Work a…
…
continue reading
1
Modern Ways to Improve Presentation Skills with Nausheen Chen.
52:25
52:25
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
52:25
Nausheen Chen joins us. She is a wildly popular professional public speaking coach with clients like leaders at Google, Amazon and huge brands like Timberland and more. Check out her site:www.speaking.coach Nausheen has a free course we encourage you to check out! https://www.speaking.coach/free-course/ She shares her insights on modern ways to imp…
…
continue reading
A young man stops for a restroom break during a walk with his mom along the seaside in the United Kingdom and is never seen again. His family has been searching for him for over 30 years… If you have information regarding Steven Clark’s case and you’re in the U.K., you can speak to the cold case team directly by dialing 101. Or you can remain anony…
…
continue reading
1
New Ways to Reduce Risks from Deep Fake
39:06
39:06
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
39:06
Are you real? What will Deepfake do to Security Risk? Shocking Examples. Summary In this conversation, Dino Mauro and Mark Mosher discuss the rise of deepfake technology and its implications for individuals, families, and organizations. They explore the real-world applications of deepfake, the advancements in technology, and the dangers it poses in…
…
continue reading
1
How Deep Fake Videos Increase Security Risks.
1:13:24
1:13:24
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
1:13:24
Paul Eckloff was a US Secret Service Agent for 23 years. Today we discuss how deep fake videos increase security risks. Topics include: artificial intelligence risks in cyber, new ways to reduce risk of deep fakes, how are deep fakes made, how are deep fake videos made, how are audio deep fakes made, and how is ai making it harder to detect deep fa…
…
continue reading
1
MURDERED: María Marta García Belsunce Part 2
29:08
29:08
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
29:08
When tragedy strikes in a wealthy Argentinian community, the suspicions of the nation fall squarely on the victim’s own family, and the case takes on a life of its own. This is Part 2 of 2. Source materials for this episode cannot be listed here due to character limitations. For a full list of sources, please visit: crimejunkiepodcast.com/murdered-…
…
continue reading
This April Fool's Day, "Tax Crime Junkies" takes a detour from the usual maze of numbers and legal intrigue to bring you something completely different—a bonus episode packed with our most hilarious bloopers! Join Dom and Tom as they let their guard down and share the moments that didn't make the cut. From tongue-tied explanations of tax legislatio…
…
continue reading
1
MURDERED: María Marta García Belsunce Part 1
43:19
43:19
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
43:19
When tragedy strikes in a wealthy Argentinian community, the suspicions of the nation fall squarely on the victim’s own family, and the case takes on a life of its own. This is Part 1 of 2. Listen to Part 2 NOW in the Fan Club! Source materials for this episode cannot be listed here due to character limitations. For a full list of sources, please v…
…
continue reading
1
New Ways Leaders Can Assess Their Risk Appetite
54:11
54:11
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
54:11
In this conversation, Dan Elliott, principal cybersecurity risk advisor at Zurich, discusses new ways leaders can assess their risk appetite. KEY TOPICS: · how risk appetite effects your cyber security plans, · explaining risk appetite in cyber security to leadership, · how security planning involves risk appetite, · new ways leaders can assess the…
…
continue reading
1
Top Cyber Risks in Higher Education
58:17
58:17
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
58:17
John Hoyt, the CISO of Clemson University, shares his journey into cybersecurity and discusses the top cyber risks in higher education. He recounts his first experience with an ethical hacker and how it sparked his interest in the field. Hoyt emphasizes the importance of cyber resiliency and preparedness in the face of evolving threats. We discuss …
…
continue reading
Details explained on blockbuster new episodes coming, weekly live-streams and our new Webinar series starts April 30th. Find details at www.CyberCrimeJunkies.com Key topics: Effective ways to protect business from cyber crime, How employees can create insider threats, How intelligence gathering is critical to security, How to stop social engineerin…
…
continue reading
1
Episode 35: The Road to Redemption: Frank Kelly's Journey Continues Part 2
28:45
28:45
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
28:45
Episode Summary: In this compelling follow-up episode of "Tax Crime Junkies," hosts Dom and Tom continue their deep dive with Frank Kelly, the tax preparer whose battle against federal charges captivated our audience. In Part 2 of our exclusive interview, Kelly opens up about the aftermath of his trial, his journey towards personal and professional…
…
continue reading
1
CONSPIRACY: The Frog Boys of South Korea
50:21
50:21
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
50:21
When five young boys vanish from their village in South Korea, local authorities are quick to assume they ran away. However, their parents know that’s not what happened – and as their search for their children expands, they become convinced that something terrible happened… and it’s being covered up. Source materials for this episode cannot be list…
…
continue reading
1
Hidden Cyber Security Risks In Software-As-A-Service (SaaS) Platforms
38:08
38:08
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
38:08
How safe are software-as-a-service platforms? Yasir Ali is the Founder and CEO of Polymer, explores hidden cyber security risks in software as a service platforms and innovative ways to reduce risks in software messaging apps. Polymer is a data loss prevention platform for Software-as-a-service platforms. It leverages AI which automates the protect…
…
continue reading
This episode includes cyber security leader, Chris Gardner a data security and recoverability expert with Rubrik (www.Rubrik.com) and we know it’s something cybercrime junkies will enjoy because it addresses the crux of cyber crime: data protection and ransomware. We dive into what to do after ransomware attack and how to plan up front so you can g…
…
continue reading
Fore more see www.cybercrimejunkies.com Find video of this on YouTube @CyberCrimeJunkiesPodcast Try KiteWorks today at www.KiteWorks.com Don't Miss our Video on this Exciting KiteWorks Offer! Watch Video Episodes! And Please...Subscribe to our YouTube Channel. Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews. Submit Your Quest…
…
continue reading
1
MYSTERIOUS DEATH OF: Joyce and John Sheridan
52:53
52:53
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
52:53
Since 2014, the mysterious deaths of Joyce and John Sheridan have been a major topic of conversation in Skillman, New Jersey. And as you might expect from the title, the story I have for you today is not as cut-and-dried as certain city officials would have you believe. In fact, the deeper I dove into this story, the more confused, shocked, and ang…
…
continue reading
1
How Business Can Transfer Cyber Risk
41:18
41:18
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
41:18
In this conversation, Jeff Severino and Nathan Borghardt discuss the importance of cyber insurance for small businesses. They share their background and approach to cyber insurance, emphasizing the need for risk transfer. They highlight 12 low-cost measures that small businesses can implement to reduce their cyber risk. The conversation also explor…
…
continue reading
After midnight on July 6th, 2012, three teenage girls walked into the thick Appalachian woods somewhere along the Mason-Dixon county line. Hours later, under the glow of a nearly full moon, only two walked out. The very last time Dave and Mary Neese saw their only child Skylar was in a grainy black-and-white video. In it, she's sneaking out of her …
…
continue reading
1
Episode 34: An Insider's Tale: Frank Kelly Speaks Out
27:35
27:35
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
27:35
Episode Summary: Don't Miss - who Frank says is fat, bald headed pigtails on a flying carpet. In an unprecedented episode of "Tax Crime Junkies," hosts Dom and Tom sit down with Frank Kelly, the tax preparer at the heart of the United States v. Frank Kelly case. After navigating through a harrowing legal battle against charges of conspiracy to defr…
…
continue reading
1
UBER Crime Story 2. How Security Leaders Can be Liable.
59:41
59:41
Lire Plus Tard
Lire Plus Tard
Des listes
J'aime
Aimé
59:41
This episode delves into the significance of a major data breach and the trial of Joe Sullivan, Uber's former chief security officer, discussing how Security Leaders can be liable. This conversation discusses the Uber breach and the ongoing trial of Joseph Sullivan, the former chief security officer of Uber The conversation explores how the hacker …
…
continue reading