Logo

    #phishing

    Explore "#phishing" with insightful episodes like "S2 - Episode 006 – You ARE the Weakest link!", "S2 - Episode 001 – The Dark Web Revisited" and "#11 - Was tun gegen Cyberangriffe?" from podcasts like ""Cyber Distortion Podcast Series", "Cyber Distortion Podcast Series" and "Entdeckt, erklärt, erzählt"" and more!

    Episodes (3)

    S2 - Episode 006 – You ARE the Weakest link!

    S2 - Episode 006 – You ARE the Weakest link!

    A long time in the making, this episode on the importance of User Awareness may just be the most important episode we’ve released so far.

    Kevin Pentecost and Jason Popillion are security veterans and Certified Information Systems Security Professionals (CISSPs) who know their way around a good User Awareness Training program having personally trained in classroom led environments as well as fostered and matured their own corporate training programs over their years as Cybersecurity managers.

    Join us as the duo delve into the critical topic of Cybersecurity User Awareness. With their wealth of experience, they provided invaluable insights and practical advice on how individuals can protect themselves against evolving cyber threats.

    They emphasize that user awareness plays a pivotal role in defending against cyber threats. They highlight the fact that attackers often exploit human vulnerabilities and trick individuals into compromising their own security. By enhancing user awareness, people can become more proactive in recognizing and responding to potential threats. A key role is understanding that just like every technical control, YOU are a critical layer of defense both in your personal life, and in your corporate environment.

    We take a look at the prevalence of social engineering attacks, which manipulate human psychology to deceive individuals into divulging sensitive information or performing harmful actions. We explain common tactics such as phishing emails, vishing calls, targeting spear phishing, CEO Spoofing, and many other non-email related social engineering tactics.

    To counter these threats, they recommend adopting a skeptical mindset, scrutinizing unexpected communications, and verifying the authenticity of requests before taking any action.

    Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Director for a Manufacturing company.

     

     

    DOWNLOADS:

    PRINT and HANG this on your Wall:

     Printable Version of the Cyber Distortion Podcast “Red Flags” PDF

    CyberDistortion Blog:

    https://cyberdistortionpodcast.com/

    CyberDistortion Swag Shop:

    https://cyberdistortionswag.shop/

     

     

    S2 - Episode 001 – The Dark Web Revisited

    S2 - Episode 001 – The Dark Web Revisited

    WE ARE BACK! Happy 2023 friends…

    In this exciting episode of or BRAND NEW season 2, Kevin and Jason make good a promise from Season 1 where they go back and take a deep dive into the Dark Web. This time, we’re coming with a purpose! We go back to investigate and see what’s really out there and try to separate myth from reality.

    Have you always wondered what really exists out on the Dark Web? Do you have a curious bone just itching to go check it all out for yourself? Well, you’re in luck! In this episode, you’ll learn all about how to properly prep to take this journey for yourself. Do we actually recommend it? Listen and find out!!

    Find out more about the original Dark Web marketplace founded by Ross Ulbricht known as the Silk Road and other place you can still visit today. Learn how to browse the Dark Web, how it all started, and how many people actually surf the Dark Web today. Learn facts you probably didn’t know about this mysterious corner of cyberspace. Lastly, find out things you can ACTUALLY purchase on the Dark Web. You might just be surprised at some of these!!

    It is important to mention that no humans were trafficked, and no organs were harvested in the making of this episode!

     

    CITATIONS:

    How to Safely Browse the Dark Web

    IDEALLY…Visit the Dark Web via an isolated OS

    ·         Here are some of the most popular options:

    o   Whonix - https://www.whonix.org/

    o   Tails  - https://tails.boum.org (as mentioned on our episode)

    o   Qubes - https://www.qubes-os.org/

    o   Kali Linux - https://www.kali.org/ (awesome hacking tools packaged with this OS)

    o   TrueOS - https://www.trueos.org/

    Get the Tor Browser:

    https://www.torproject.org/download/

    Use a good VPN – Here are some popular options (some offer free 30 day trials):

    ·         NordVPN - https://nordvpn.com/

    ·         SurfShark - https://surfshark.com/

    ·         TorGuard - https://torguard.net/

    ·         Proton VPN - https://protonvpn.com/

    ·         IP Vanish - https://www.ipvanish.com/

    ·         Express VPN - https://www.expressvpn.com/

    ·         RusVPN - https://rusvpn.com/en/

     

     

     

    Learn about Surfing the Dark Web Online

    https://www.udemy.com/courses/search/?src=ukw&q=Dark+Web

    Dark Web Stats and Facts

    https://websitebuilder.org/blog/dark-web-statistics/

    Dark Web Usage Stats

    https://earthweb.com/how-many-people-use-the-dark-web/

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io