Logo
    Search

    phishing

    Explore "phishing" with insightful episodes like "Hong Kong Deepfake Heist + Three Million Toothbrush Botnet + Hacked Canada", "Why web browsers are key to cyber security | Sponsored", "Fraud influencers, phishing and scams — account takeovers are on the rise", "Pondering the Worldcoin Orb + the Gang Who Cracked Outlook + Hacking Together Superconductors for Fun and Profit" and "The FBI Shuts Down Hive, Sky Hacks, and the Phishing Never Ends." from podcasts like ""Hacked", "The New Statesman Podcast", "Marketplace Tech", "Hacked" and "Hacked"" and more!

    Episodes (13)

    Why web browsers are key to cyber security | Sponsored

    Why web browsers are key to cyber security | Sponsored

    Cyber-crime is predicted to cost the global economy $8tn this year, in part due to increased remote working - borne out by a spike in malware attacks at the start of the pandemic.


    But should responsibility for security lie solely with individual employees?


    “We really think it should be the responsibility of the browser vendor, the web developer, and the IT admin to make sure that the user doesn't have to think about security as much as possible,” says Emily Stark, a software engineer at Google, who joins host Becky Slack on this episode.


    Also on the panel is cyber security expert Matt Hasker, global web director of Get Safe Online.


    Together they explore the role browsers can play in securing users' and companies' data online.


    This episode is sponsored by Chrome Enterprise. Learn more about how your enterprise browser can protect your company data and improve cybersecurity on the Chrome Enterprise website


    Listen to all our Spotlight on Policy episodes here: https://podfollow.com/spotlight-on-policy-from-the-new-statesman



    Hosted on Acast. See acast.com/privacy for more information.


    Fraud influencers, phishing and scams — account takeovers are on the rise

    Fraud influencers, phishing and scams — account takeovers are on the rise

    Whether it’s for travel, meals or event tickets, it’s hard to deny the allure of a good deal. And providing discounts through fraudulent means is a thriving business online. Once mostly relegated to the far reaches of the dark web, fraudsters are offering questionable deals to consumers on mainstream social media sites and messaging apps. That’s according to the online fraud prevention company Sift. Part of the scam is what is called an account takeover or ATO. Marketplace’s Lily Jamali spoke with Brittany Allen, a trust and safety architect with Sift, about why ATOs are increasing.

    Pondering the Worldcoin Orb + the Gang Who Cracked Outlook + Hacking Together Superconductors for Fun and Profit

    Pondering the Worldcoin Orb + the Gang Who Cracked Outlook + Hacking Together Superconductors for Fun and Profit
    In this chat episode we discuss Sam Altman's Worldcoin biometric ID / crypto project, the cybercrime syndicate that used a vulnerability in Microsoft to hack the US State Department, and a weird week on the internet for amateur scientist investigating LK99. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The FBI Shuts Down Hive, Sky Hacks, and the Phishing Never Ends.

    The FBI Shuts Down Hive, Sky Hacks, and the Phishing Never Ends.
    A chat episode about the FBI takedown of the Hive ransomware as a service gang, a leak of the No Fly List, a mucked up file that grounded every plane in the US, the persistence of phishing, and the slow march of AI in courtrooms. Also Zelda, for some reason, for the second time in as many months. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Paperweights

    Paperweights
    The story of the wild amount of work it takes to turn a stolen phone back into money. If you like the show and want to make sure we can keep making it, please subscribe, and if you can visit https://www.patreon.com/hackedpodcast and show us some love. Thanks to our sponsor Command Line Heroes. Check out the show right over here -> https://link.chtbl.com/commandlineheroes_cyoa?sid=s9.podcast.hacked Learn more about your ad choices. Visit podcastchoices.com/adchoices

    111: ZeuS

    111: ZeuS
    ZeuS is a banking trojan. Designed to steal money from online bank user’s accounts. This trojan became so big, that it resulted in one of the biggest FBI operations ever. Sponsors Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Keeper Security. Keeper Security’s is an enterprise password management system. Keeper locks down logins, payment cards, confidential documents, API keys, and database passwords in a patented Zero-Knowledge encrypted vault. And, it takes less than an hour to deploy across your organization. Get started by visiting keepersecurity.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    How Ben's Twitter Got Hacked on Breach of the Week #2

    How Ben's Twitter Got Hacked on Breach of the Week #2

    What do Ben Horowitz and former President Obama have in common?  They both had their twitter accounts taken over to send cryptocurrency spam.

    With our office now our home, all security has become personal. This week on Breach of the Week, Ben explains how his Twitter got hacked, and Geoff and Joel break down the personal threat landscape, the security measures that best protect you, and where the security industry needs to evolve to better protect individuals. 

    🔐Breach of the Week 🔐looks at who got hacked, how it happened, and what it means for the industry. 

    🎙With hosts Joel de la Garza (a16z Security Operating Partner) and Geoff Belknap (CISO LinkedIn) on Clubhouse every Thursday 5-5:30pm.

    85: Cam the Carder

    85: Cam the Carder
    This is the story of Cam Harrison, aka “kilobit” and his rise and fall as a prominent carder. Sponsors Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25. Support for this episode comes from Oracle for Startups. Oracle for Startups delivers enterprise cloud at a startup price tag, with free cloud credits and 70% off industry-leading cloud services to help you reel in the big fish—confidently. To learn more, visit Oracle.com/goto/darknet. View all active sponsors. Sources https://www.justice.gov/opa/pr/member-organized-cybercrime-ring-responsible-50-million-online-identity-theft-sentenced-115 https://nakedsecurity.sophos.com/2014/11/14/carder-su-fraudster-jailed-for-9-years-and-ordered-to-pay-50-8m/ https://www.justice.gov/usao-nv/operation-open-market Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Force on Force

    Force on Force
    Jordan Bloemen & Scott Francis Winder discuss the attack on Trickbot. If you like the show and want to make sure we can keep making it, please subscribe and if you can visit https://www.patreon.com/hackedpodcast and show us some love. Also - don't forget to check out our loving sponsor Proton VPN. Visit protonVPN.com/hackedpodcast for 33% off a 2-year plan. Learn more about your ad choices. Visit podcastchoices.com/adchoices