Artwork

Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

LIVE: They’re Stealing You with AI 😳 | AI Risks to Identity & How to Fight Back

1:27:24
 
Share
 

Manage episode 494145577 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today.

This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen!

✅ **Don’t forget to like, subscribe, and hit the bell 🔔.**

💬 Comment your “worst phishing attempt” below—I’ll respond personally!

🌐 Visit us at: https://cybercrimejunkies.com

#SecurityAwareness #CyberCrimeJunkies #Phishing #CyberSecurityTraining #LiveTraining

Send us a text

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466

Support the show

🔥New Special Offer! 🔥
We tried Optery and it's fantastic. Remove Your Private Data Online for FreeToday.
Now you can try Optery Risk Free. Optery is our recommended way for data removal.
They are an award-winning privacy platform protecting your privacy and removing your data from data brokers and more.
🔥No risk or cost. 🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Dive Deeper:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/

  continue reading

Chapters

1. Revolutionizing Cybersecurity Training (00:00:00)

2. Understanding Cyber Threats (00:02:33)

3. The Growing Impact of Cybercrime (00:05:14)

4. The Shark Analogy: Outpacing Cybercriminals (00:08:42)

5. Myths and Misconceptions in Cybersecurity (00:11:06)

6. The Reality of Data Breaches (00:17:38)

7. The Role of Social Engineering (00:21:54)

8. The Importance of Incident Response Plans (00:27:30)

9. The Psychology of Phishing (00:35:40)

10. Exploring the Dark Web (00:39:23)

11. Case Studies of Recent Breaches (00:43:23)

12. The Rise of AI in Cybercrime (00:47:39)

13. Deepfakes and Their Threats (00:52:59)

14. Best Practices for Cybersecurity (00:59:06)

15. Key Takeaways (01:16:25)

255 episodes

Artwork
iconShare
 
Manage episode 494145577 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

If you manage care about protecting yourself, your loved ones—and your organization-- this episode offers actionable takeaways you can use today.

This is part of our official Cyber Crime Junkies podcast series—subscribe wherever you listen!

✅ **Don’t forget to like, subscribe, and hit the bell 🔔.**

💬 Comment your “worst phishing attempt” below—I’ll respond personally!

🌐 Visit us at: https://cybercrimejunkies.com

#SecurityAwareness #CyberCrimeJunkies #Phishing #CyberSecurityTraining #LiveTraining

Send us a text

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466

Support the show

🔥New Special Offer! 🔥
We tried Optery and it's fantastic. Remove Your Private Data Online for FreeToday.
Now you can try Optery Risk Free. Optery is our recommended way for data removal.
They are an award-winning privacy platform protecting your privacy and removing your data from data brokers and more.
🔥No risk or cost. 🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Dive Deeper:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/

  continue reading

Chapters

1. Revolutionizing Cybersecurity Training (00:00:00)

2. Understanding Cyber Threats (00:02:33)

3. The Growing Impact of Cybercrime (00:05:14)

4. The Shark Analogy: Outpacing Cybercriminals (00:08:42)

5. Myths and Misconceptions in Cybersecurity (00:11:06)

6. The Reality of Data Breaches (00:17:38)

7. The Role of Social Engineering (00:21:54)

8. The Importance of Incident Response Plans (00:27:30)

9. The Psychology of Phishing (00:35:40)

10. Exploring the Dark Web (00:39:23)

11. Case Studies of Recent Breaches (00:43:23)

12. The Rise of AI in Cybercrime (00:47:39)

13. Deepfakes and Their Threats (00:52:59)

14. Best Practices for Cybersecurity (00:59:06)

15. Key Takeaways (01:16:25)

255 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play