Logo
    Search

    Podcast Summary

    • Protecting Personal Privacy: A Constant ChallengeStay informed about privacy risks, use strong passwords, enable two-factor authentication, and be cautious about sharing info online. Companies must also secure our data.

      The privacy of our personal information, especially sensitive content like nude photos, is under constant threat from various sources. This includes law enforcement misusing their access to databases, hackers breaching our accounts, and even people with access to our home security systems. It's essential to be aware of these risks and take steps to protect ourselves, such as using strong passwords, enabling two-factor authentication, and being cautious about what information we share online. Additionally, companies have a responsibility to secure our data and prevent unauthorized access. This episode serves as a reminder that our privacy is not guaranteed, and we must take proactive measures to safeguard it.

    • Managing Finances and Unexpected ChallengesPersonal finance apps like Rocket Money can save money by canceling subscriptions, monitoring spending, and lowering bills. Despite unexpected challenges, prioritize financial management for long-term savings.

      Personal finance management apps like Rocket Money can significantly help individuals save money by canceling unwanted subscriptions, monitoring spending, and even lowering bills. Madison, a college graduate and marketing and communications student, experienced an unexpected and distressing situation when her partially nude photos were shared online without her consent. Despite this, she emphasized the importance of financial management tools like Rocket Money. With over 5 million users and $500 million in savings, Rocket Money is a popular choice for those looking to optimize their finances and grow their savings. If you're looking to save money and gain better control over your spending, consider giving Rocket Money a try.

    • Online anonymity can lead to harmful experiencesOnline anonymity can result in distressing situations, making it challenging for victims to identify perpetrators and seek help, potentially leading to long-term impacts on mental health and daily life.

      Online anonymity can lead to harmful and distressing experiences, as seen in the case of a woman whose partially exposed nudes were shared on 4chan without her consent. The anonymity of the platform made it difficult for her to identify the perpetrator and stop the harassment. The situation escalated, leading to relentless messaging and even affecting her ability to sleep and function normally. The woman's attempts to seek help were met with skepticism, but as the situation worsened, she and her twin sister reported it to the police and sought assistance from law enforcement and online resources. The experience was traumatic and exposed them to the dark underbelly of the internet, raising questions about privacy, online safety, and the responsibilities of platforms and law enforcement in addressing such issues.

    • Online harassment: A long-term, distressing experienceKeep personal info private and be cautious when sharing online to avoid long-term distress and potential escalation of harassment

      Online harassment can be a long-term and deeply distressing experience. Madison's story illustrates how a harasser was able to access her private social media accounts, leading to years of relentless harassment. The situation escalated when her boyfriend, trying to help, inadvertently provided the harasser with additional photos, making the situation even worse. This incident underscores the importance of keeping personal information private and being cautious when sharing it online. It also highlights the emotional toll of online harassment and the need for support and resources to deal with such situations.

    • Unintended sharing of private contentBe cautious about who has access to private content, as it can be easily shared without consent, even if it's implied nudity

      Technology can easily lead to the unintended sharing of private content. In this case, a man in a long-distance relationship had access to explicit videos and photographs of his girlfriend, and later, her nude boudoir photos. He obtained these images by going through thousands of photos on a CD, saving the ones with nip slips, and shared them online. This incident highlights the importance of securing private content and being cautious about who has access to it. Even implied nude photos, which do not show explicit nudity, can be shared and distributed without consent. This situation not only caused distress for the individuals involved but also underscores the need for privacy and security in the digital age.

    • Online harassment affects anyone, regardless of backgroundOnline harassment is a criminal act, victims should be supported, and parents should have open conversations about online safety

      Online harassment is a serious issue that can affect anyone, regardless of their actions or background. The case of Madison and her sister Christine illustrates this, as Christine's private photos were leaked without her consent and ended up on revenge porn sites. It's important to remember that victims should not be blamed or shamed, but rather supported and helped. Harassment and extortion are criminal acts that should not be tolerated, and the focus should be on holding the perpetrators accountable. Parents also face challenges in dealing with their children's online experiences, especially when it comes to embarrassing situations or cyberbullying. It's crucial to have open and honest conversations about these issues and to work together to make the online world a safer and more positive place.

    • Legal options for individuals facing revenge pornIndividuals can use copyright ownership of self-images to request removal of revenge porn and involve law enforcement for support, but persistence and understanding of legal landscape is crucial.

      Individuals who have had intimate photos shared without their consent, known as "revenge porn," have legal options to protect themselves. The automatic copyright ownership of self-taken images allows individuals to request copyright transfer and use it as leverage to remove the content. However, reporting the issue to law enforcement and advocating for training on relevant laws can be challenging. In Christine's case, she faced years of harassment and nonstop online exposure, eventually involving her parents. The situation became even more complicated when she was turned away from the sheriff's department despite the new Florida law addressing nonconsensual pornography. It's essential to understand the legal landscape and be persistent in seeking help to address these issues.

    • Sisters Investigate Years of Online HarassmentDetermined sisters used clues to identify online harasser despite lack of content moderation on anonymous platforms

      The sisters, Madison and Christine, faced years of harassment, which escalated to a point where they were experiencing mental breakdowns. They documented every instance of harassment and tried to find clues to identify the perpetrator. The harassment often took place on anonymous platforms like 4chan and Kik, where content moderation was lacking. They discovered that the harasser had an unusual way of typing on Kik, which helped them identify potential suspects. The episode also highlighted the issue of Kik being a platform that allows for illegal activity and lacks proper content moderation. The sisters' determination and resourcefulness in investigating the harassment serve as a reminder of the importance of staying vigilant and persistent in the face of online threats. Additionally, the sponsor message introduced Mint Mobile, a wireless service provider that offers affordable plans by cutting out the cost of retail stores, making it an attractive option for consumers looking to save money on their wireless bills.

    • Online activity can uncover wider patterns of abuseOnline harassment can lead investigators to discover a larger web of criminal behavior, including the identification of perpetrators and their connections to victims.

      Online activity, no matter how hidden, can lead investigators to a larger web of criminal behavior. In this case, a Kik user's obsession with harassing and sharing nudes of five women, including underage girls, led investigators to uncover a wider pattern of abuse. The discovery of this user's activity on 4chan and the identification of his real name, Christopher, through a Snapchat screenshot, was a major breakthrough in the investigation. However, the most shocking revelation was that Christopher was a friend of one of the victims, known from college and even attended their wedding. This underscores the importance of being vigilant about online activity and the potential consequences of past relationships.

    • Determination and investigation uncover unexpected truthThorough investigation and determination can reveal surprising truths, even when initial assumptions are wrong.

      The power of determination and thorough investigation can lead to uncovering the truth, even in the most unexpected circumstances. The speaker's friend was accused of being the perpetrator behind harassing posts on 4chan, an online message board. Despite initial skepticism due to the friend's supposed lack of intelligence and tech savvy, the speaker couldn't shake off the suspicion. He spent hours searching through archived posts on 4chan, using kicknames to trace the user's identity. A post featuring a young girl in a Catholic school uniform with a distinctive embroidered crest led him to the user's location and family members on Facebook. The realization that it was indeed his friend left him in disbelief and guilt. The incident serves as a reminder that no detail is too small to overlook when investigating and that everyone, no matter how well-known, should be held accountable for their actions.

    • Friend introduces harasser, difficult to identify him onlineVictims of online harassment need support and unity, increased awareness and action from law enforcement to escape and prosecute harasser.

      Online harassment can come from unexpected sources, and the anonymity of the Internet can make it difficult to identify the perpetrator. In this case, a friend of the speakers introduced them to a man who ended up harassing and destroying the lives of several women, including the speakers' wife and sister-in-law. The women were able to gather evidence and identify the harasser as Christopher, but he continued his campaign of harassment unaware that he had been discovered. The nature of cyber harassment makes it difficult for victims to escape, and some have even taken their own lives as a result. To bring attention to the issue and ensure prosecution, the women came together and planned to involve other victims while keeping their plan a secret from the harasser. The experience highlights the importance of support and unity among victims of online harassment and the need for increased awareness and action from law enforcement and society as a whole.

    • Victims of revenge porn band togetherCollaborating with others who have experienced revenge porn can strengthen a case against the perpetrator and raise awareness about the issue.

      When dealing with sensitive and potentially harmful situations, it's crucial to band together and involve others who have experienced similar issues. In this case, the victims of a man's revenge porn campaign reached out to each other and shared their evidence, ultimately presenting a compelling case to law enforcement. However, the decision to involve others, especially current partners or family friends, can be challenging and requires careful consideration. Trust and communication are key, but it's essential to remember that the collective voice of victims can be more impactful than individual experiences. In the end, the victims' determination and collaboration led to a stronger case against the perpetrator and raised awareness about the issue of revenge porn.

    • Preparing Extensive Evidence for Cybercrime ReportingThorough research and preparation are essential when reporting a cybercrime. Identify potential law violations and gather evidence to present to authorities.

      Thorough research and preparation are crucial when reporting a cybercrime. In this case, Christine compiled extensive evidence, including background information on victims, potential law violations from various jurisdictions, and relevant laws. She identified several statutes that the perpetrator likely violated, both at the state and federal levels. Despite presenting this compelling evidence to the police, she encountered resistance and was advised to hand it over to a detective. This experience underscores the importance of being well-informed and persistent when dealing with cybercrimes.

    • Women face challenges reporting online harassment to local policeDespite evidence, some women must take legal action to collect evidence against harassers due to police limitations, emphasizing the importance of FBI's role in online harassment investigations.

      Despite having compelling evidence against a harasser and going to multiple police stations to report the crime, some women were unable to file police reports and were instead forced to take legal action themselves to obtain the necessary subpoena power to collect evidence. This lengthy and frustrating process highlights the limitations of local law enforcement in handling online harassment cases and the importance of the FBI's role in such investigations. Ultimately, the sisters' determination and resourcefulness led to the identification and apprehension of the harasser, but the process underscores the need for improved policies and procedures to better support victims of online harassment.

    • Victims' advocacy and law enforcement crucial in fighting online harassment14-year-old victim's case drew significant attention, leading to arrest. Victims' persistence paid off despite continued harassment.

      Anonymity is crucial for victims in legal cases, especially when dealing with online harassment. However, in this particular case, the 14-year-old victim's involvement drew significant attention from law enforcement and ultimately led to the arrest of the perpetrator. The victims, who were also lawyers, took a relentless approach to fighting back by utilizing their legal knowledge and resources. Despite the perpetrator's continued harassment, including criminal and civil cases, and broken promises to stop, the victims' persistence paid off. The case highlights the importance of victims' advocacy and the role of law enforcement in addressing online harassment.

    • Women's determination leads to justice after a decade of harassmentDetermination and persistence paid off for women who opened civil and criminal cases against a harasser, leading to his arrest and conviction, allowing them to voice their impact statements during sentencing.

      Determination and persistence can lead to justice, even if it takes years. In this case, multiple women worked together to open civil lawsuits and criminal cases against a man who had harassed them for over a decade. Despite the lengthy process, they were able to gather enough evidence for his arrest and conviction. During the sentencing hearing, the victims had the opportunity to voice their impact statements, ensuring the judge understood the harm caused. Although the experience was terrifying and included unexpected challenges, such as questioning from the judge, the women's voices were heard, and justice was served.

    • Impact statements influence outcomesVictim impact statements and dedication can lead to harsher sentences, providing closure and relief, but unexpected challenges can prolong the healing process

      The power of a victim impact statement and the dedication of those involved in a case can significantly influence the outcome, even leading to a more severe sentence than initially expected. Despite the long and emotional process, the validation and justice achieved can provide a sense of closure and relief for victims. However, unexpected challenges and setbacks can prolong the healing process. In this case, a cyberharasser was sentenced to 15 years in prison after a heartfelt impact statement, but the case was later reopened due to a procedural error, leaving the victims with renewed pain and uncertainty.

    • The sisters' journey for justice against their stalkerDespite facing financial challenges and setbacks, the sisters persevered and won a criminal case against their stalker. Their story underscores the importance of self-advocacy and community support in overcoming adversity.

      The sisters' journey for justice against their stalker was a long and emotionally draining process. Despite facing numerous challenges and setbacks, they persevered and eventually won the criminal case against him. However, the financial costs associated with the legal proceedings and the civil lawsuit were significant. The sisters had to travel to court, pay for expensive lawyer fees, and open a civil suit to gather evidence. The stalker, seeing that he was likely to lose the civil lawsuit, filed for bankruptcy to avoid paying any fines or restitution. The sisters may never see the money they are owed, but the judge recognized their struggles and added the damages to the stalker's sentence. The sisters' experience highlights the importance of advocating for oneself and the power of a supportive community in overcoming adversity. Their story is a reminder that the journey towards justice can be long and difficult, but the pack of victims can survive and even thrive, as the lone wolf ultimately meets his demise.

    • Behind the Scenes of Darknet DiariesCreating a podcast like Darknet Diaries involves a team effort with roles like creation, sound design, assembly, and theme music.

      The creation and production of the Darknet Diaries podcast involves a team of individuals with unique roles. The episode discussed was created by Jack Rhysider, sound designed by Andrew Merriweather, assembled by Tristan Ledger, and features theme music by the break master cylinder. Jack's New Year's resolution for the podcast is to achieve a goal of 4k. This information was shared during the podcast itself. It's a reminder that creating engaging content, even in a podcast format, requires collaboration and dedication from a team of talented individuals.

    Recent Episodes from Darknet Diaries

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    137: Predator

    137: Predator
    A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, and then suck up all the data from it. Contacts, text messages, location, and more. This malware is being sold to intelligence agencies around the world. In this episode we hear from Crofton Black at Lighthouse Reports who spent 6 months with a team of journalists researching this story which was published here: https://www.lighthousereports.com/investigation/flight-of-the-predator/. We also hear from Bill Marczak and John Scott-Railton from Citizen Lab. If you want to hear about other mercenary spyware, check out episodes 99 and 100, about NSO group and Pegasus. To hear another episode about Greece check out episode 64 called Athens Shadow Games. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Akamai Connected Cloud (formerly Linode). Akamai Connected Cloud supplies you with virtual servers. Visit linode.com/darknet and get a special offer. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    I lost my pet! Can identify theft also happen? ft. Pamela Fusco

    I lost my pet! Can identify theft also happen? ft. Pamela Fusco
    Join me in this episode with Pamela Fusco. In this engaging episode we discussed the topic of Smart Pet ID's and Pamela’s journey in the world of cybersecurity as the leader of large and global organizations, her work in the government and real stories about victims that lost their pets and their risk of identity theft and the solution she created with ZuluTails.

    Pamela Fusco has 33 years of experience leading Cybersecurity, Privacy and GRC missions. Pamela has been instrumental in implementing the CISO Executive Forum, ISSA Women in Security. She currently is the CEO of ZuluTails, Chairman of CBG and resides on the ISSA International BoD as an Executive Officer and CFO.

    Pamela has lead significant cyber teams and missions globally as CISO of Merck, Digex/MCI, Apollo Group, Citibank, and Splunk, and supported the United States White House.

    An industry-recognized innovator, Pamela was a founding member of SAFE Bio Pharma Inc., Cloud Security Alliance, President NY Metro CSA Chapter. Pamela began her career in the US Navy as a cryptologist, focused on supporting security proceedings for government and national intelligence.

    Offers:
    ZuluTails
    Cyber Bear Group

    You can contact Pamela through the website contact information at ZuluTails

    Sandra Estok is the founder of Way2Protect™, author of the international bestselling and award-winning Happily Ever Cyber!™ book, and the Cyber Literacy series for children. She is a Keynote Speaker and Corporate Trainer with over 20 years of experience in Cybersecurity, IT and Data Privacy. Her mission is to empower women to take charge of their cyber safety and have Peace of Mind Online.

    Website link https://SandraEstok.com
    Social media handle: @Way2Protect

    To watch Sandra Estok’s TEDx talk “What an identity theft victim can teach about cybercrime" click here. Or copy this link directly into your browser: https://www.youtube.com/watch?v=v46TAoZl1XI
    Please share this powerful TEDx talk by Sandra.

    Nemours Use Of RSA Archer To Manage Compliance Risk - Kevin Haynes - SCW #22

    Nemours Use Of RSA Archer To Manage Compliance Risk - Kevin Haynes - SCW #22

    Customer perspective on the three topics discussed with RSA in first segment Also: -What is your view of security vs. compliance vs. risk? -What drives your security program initiatives? -What are the biggest challenges in administering a security program?

     

    To learn more about RSA Security, visit: https://securityweekly.com/RSAsecurity

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://wiki.securityweekly.com/SCWEpisode22

    Data Security Compliance & Virginia’s New Privacy Law, Part 2 - Chris Pin - SCW #72

    Data Security Compliance & Virginia’s New Privacy Law, Part 2 - Chris Pin - SCW #72

    Just last month, Virginia became the second state in the U.S. to pass a privacy law – the Consumer Data Protection Act (CDPA). While this doesn’t take effect until 2023, it’s important for businesses to understand what it means for them and start preparing for data security compliance now.

    Chris Pin, VP of Security and Privacy at PKWARE, will be discussing:

    • How Virginia’s law differs from CCPA and GDPR and the key points companies need to know

    • Where and how companies may need to enhance their data privacy policies and processes, and specifically how it’s imperative to know the five W’s of data: Who, What, Why, When, Where and one H, How

    • How companies should begin incorporating data discovery, data classification, data minimization, records of data processing activities, and data protection assessments as part of their everyday processes and controls, if they haven’t already

    • Real life situations that businesses could find themselves in

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw72