goodlisten
Studio
​

GoodListen © 2023

About

Privacy Policy

Terms of service

Support

Blog

Search Podcasts

Podcasts

Categories
/

Cybersecurity

Cybersecurity

Chapters
NSO's Cyber Weapons and Israel's Diplomacy
Israel's Ministry of Defense's ability to approve or deny access to NSO's cyber weapons has become entangled with its diplomacy, similar to the conventional weapons industry.
11:30 - 23:17 (11:47)
listen on Spotify
Cybersecurity
Summary

Israel's Ministry of Defense's ability to approve or deny access to NSO's cyber weapons has become entangled with its diplomacy, similar to the conventional weapons industry. The current standoff between the US and Israel regarding NSO illustrates how countries increasingly view cyber weapons as crucial to national defense and a currency to buy influence worldwide.

Episode
The Sunday Read: 'The Battle for the World’s Most Powerful Cyberweapon'
Podcast
The Daily
The Importance of Home Cybersecurity
With increasing cybersecurity breaches and data compromises, people should start taking home cybersecurity more seriously by turning their homes into secure information facilities.
21:59 - 27:49 (05:50)
listen on Spotify
Cybersecurity
Summary

With increasing cybersecurity breaches and data compromises, people should start taking home cybersecurity more seriously by turning their homes into secure information facilities. In Silicon Valley, transparency is often mistaken for cybersecurity, but it's important to understand the dangers of sharing sensitive information at scale.

Episode
E8: TikTok + Oracle, how privacy loss will impact society, economy & COVID outlooks for 2021 & beyond, California wildfires & more
Podcast
All-In with Chamath, Jason, Sacks & Friedberg
Cybersecurity Knowledge Gap
The gap between the cybersecurity knowledge of investigators and kids involved in online communities needs to be filled, and this poses a challenge.
15:30 - 20:37 (05:07)
listen on Spotify
Cybersecurity
Summary

The gap between the cybersecurity knowledge of investigators and kids involved in online communities needs to be filled, and this poses a challenge. Parental controls prove inadequate for protecting children online.

Episode
MISSING: Alicia Navarro
Podcast
Crime Junkie
Cybersecurity Threats and Protection Measures
The speaker shares a personal experience of a cybersecurity breach and advises to change passwords and consider getting new devices to protect personal information.
19:09 - 26:20 (07:10)
listen on Spotify
Cybersecurity
Summary

The speaker shares a personal experience of a cybersecurity breach and advises to change passwords and consider getting new devices to protect personal information. They suggest that there are more cybersecurity measures than what they discussed in the podcast.

Episode
S15 E11: [What Came Next Presents] SWW S9 Updates // Part 2
Podcast
Something Was Wrong
Blackmail Threat Due to Webcam Hack
The speaker received a blackmail threat after his webcam was hacked and used to film him during a private moment.
1:07:25 - 1:09:08 (01:43)
listen on Spotify
Cybersecurity
Summary

The speaker received a blackmail threat after his webcam was hacked and used to film him during a private moment. The hacker demanded money within 84 hours or else the video clip would be released to the speaker's contact list.

Episode
Ep 385 - Master Chief Ferrari Truck (feat. LeMaire Lee)
Podcast
Matt and Shane's Secret Podcast
Citizen Lab uncovers sophisticated phishing links
Citizen Lab has discovered a large number of phishing links that are being sent to victims with a high level of sophistication - when opened, it preloads text and screens to convince the user that they are already signed into their Gmail and just need to re-enter their password.
17:16 - 22:47 (05:30)
listen on Spotify
Cybersecurity
Summary

Citizen Lab has discovered a large number of phishing links that are being sent to victims with a high level of sophistication - when opened, it preloads text and screens to convince the user that they are already signed into their Gmail and just need to re-enter their password. The hackers use URL shortening software to hide what the actual URL is.

Episode
79: Dark Basin
Podcast
Darknet Diaries
Requesting Crazy Things From a Hacker
A hacker describes how he flexes his power by only communicating in person for extreme requests.
40:58 - 44:33 (03:35)
listen on Spotify
Cybersecurity
Summary

A hacker describes how he flexes his power by only communicating in person for extreme requests. However, most of the time they just talk broadly about things.

Episode
#12 Luis Chaparro - Inside Cartel Drug Operations
Podcast
Shawn Ryan Show
The Rise and Fall of a Software Pioneer
This episode discusses the rise and fall of John McAfee, the software pioneer who created the anti-virus software McAfee.
1:14:09 - 1:19:59 (05:49)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

This episode discusses the rise and fall of John McAfee, the software pioneer who created the anti-virus software McAfee. It delves into his unconventional methods of management and the legal troubles he faced due to his actions.

Episode
#566 - David Senra - Insights From History's Greatest Thinkers
Podcast
Modern Wisdom
Understanding Script Kiddies and Ethical Hacking
The podcast discusses the concept of script kiddies and the lack of security in the digital world, while emphasizing the importance of ethical hacking to protect oneself and others.
2:05:49 - 2:12:01 (06:11)
listen on Spotify
Cybersecurity
Summary

The podcast discusses the concept of script kiddies and the lack of security in the digital world, while emphasizing the importance of ethical hacking to protect oneself and others.

Episode
#74: How a Computer Hacker Optimizes Online Dating, Opens Locked Cars, and Hijacks Drones
Podcast
The Tim Ferriss Show
Cybersecurity Platform Features and Self-Acceptance
The speaker shares their advice in never choosing a business and the importance of multi-layer platform security features for cybersecurity.
54:22 - 58:28 (04:06)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

The speaker shares their advice in never choosing a business and the importance of multi-layer platform security features for cybersecurity. They also discuss the significance of accepting oneself even when struggling to understand certain things.

Episode
E204: Barbara Corcoran: Turning $1,000 to $1 Billion!
Podcast
The Diary Of A CEO with Steven Bartlett
Beware of Hacking
A cautionary tale about the dangers of hacking and how it can impact your personal relationships and online security.
38:12 - 39:54 (01:42)
listen on Spotify
Cybersecurity
Summary

A cautionary tale about the dangers of hacking and how it can impact your personal relationships and online security.

Episode
My Grandparents on Surviving Polio, How They Met & Life Without AC
Podcast
The Unplanned Podcast with Matt & Abby
Anonymous Claims of Cybersecurity Expertise
The speaker describes receiving messages from anonymous individuals claiming to have expertise in cybersecurity, one of whom is said to be from Israel.
00:00 - 02:51 (02:51)
listen on Spotify
Cybersecurity
Summary

The speaker describes receiving messages from anonymous individuals claiming to have expertise in cybersecurity, one of whom is said to be from Israel.

Episode
Two Side Hustle Ideas, The Top Trait of Successful Entrepreneurs, Building a Compound with your Friends, and More
Podcast
My First Million
The Oil Pipeline Hack
The speaker asks if the other person had any involvement in the hacking of an oil pipeline along the East Coast that resulted in a $4.5 million ransom payment.
58:21 - 1:01:04 (02:42)
listen on Spotify
Cybersecurity
Summary

The speaker asks if the other person had any involvement in the hacking of an oil pipeline along the East Coast that resulted in a $4.5 million ransom payment. They mention knowing someone who works as a hacker but don't discuss his work.

Episode
Gigi Gorgeous and Howie Prank August Getty
Podcast
Howie Mandel Does Stuff Podcast
The Trend of Attacks Moving Towards Humans
With attacks moving more towards humans through social engineering tactics, it's important to consider the security of the entire stack, from networking security to software security.
01:32 - 12:46 (11:14)
listen on Spotify
Cybersecurity
Summary

With attacks moving more towards humans through social engineering tactics, it's important to consider the security of the entire stack, from networking security to software security.

Episode
#95 – Dawn Song: Adversarial Machine Learning and Computer Security
Podcast
Lex Fridman Podcast