goodlisten
Studio
​

GoodListen © 2023

About

Privacy Policy

Terms of service

Support

Blog

Search Podcasts

Podcasts

Categories
/

Cybersecurity

Cybersecurity

Chapters
Requesting Crazy Things From a Hacker
A hacker describes how he flexes his power by only communicating in person for extreme requests.
40:58 - 44:33 (03:35)
listen on Spotify
Cybersecurity
Summary

A hacker describes how he flexes his power by only communicating in person for extreme requests. However, most of the time they just talk broadly about things.

Episode
#12 Luis Chaparro - Inside Cartel Drug Operations
Podcast
Shawn Ryan Show
Viruses vs Worms: What's the Difference?
The terms viruses and worms are often used interchangeably, but viruses are usually perceived as being malicious while worms simply spread quickly.
1:25:42 - 1:30:23 (04:41)
listen on Spotify
Cybersecurity
Summary

The terms viruses and worms are often used interchangeably, but viruses are usually perceived as being malicious while worms simply spread quickly. However, most things that spread quickly online - like worms - do so with some level of malicious or self-serving intent.

Episode
#74: How a Computer Hacker Optimizes Online Dating, Opens Locked Cars, and Hijacks Drones
Podcast
The Tim Ferriss Show
Cybersecurity Platform Features and Self-Acceptance
The speaker shares their advice in never choosing a business and the importance of multi-layer platform security features for cybersecurity.
54:22 - 58:28 (04:06)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

The speaker shares their advice in never choosing a business and the importance of multi-layer platform security features for cybersecurity. They also discuss the significance of accepting oneself even when struggling to understand certain things.

Episode
E204: Barbara Corcoran: Turning $1,000 to $1 Billion!
Podcast
The Diary Of A CEO with Steven Bartlett
Cybersecurity Knowledge Gap
The gap between the cybersecurity knowledge of investigators and kids involved in online communities needs to be filled, and this poses a challenge.
15:30 - 20:37 (05:07)
listen on Spotify
Cybersecurity
Summary

The gap between the cybersecurity knowledge of investigators and kids involved in online communities needs to be filled, and this poses a challenge. Parental controls prove inadequate for protecting children online.

Episode
MISSING: Alicia Navarro
Podcast
Crime Junkie
The Importance of Home Cybersecurity
With increasing cybersecurity breaches and data compromises, people should start taking home cybersecurity more seriously by turning their homes into secure information facilities.
21:59 - 27:49 (05:50)
listen on Spotify
Cybersecurity
Summary

With increasing cybersecurity breaches and data compromises, people should start taking home cybersecurity more seriously by turning their homes into secure information facilities. In Silicon Valley, transparency is often mistaken for cybersecurity, but it's important to understand the dangers of sharing sensitive information at scale.

Episode
E8: TikTok + Oracle, how privacy loss will impact society, economy & COVID outlooks for 2021 & beyond, California wildfires & more
Podcast
All-In with Chamath, Jason, Sacks & Friedberg
Russia’s cyberattack on Ukraine’s power grid
The recent cyberattack on Ukraine’s power grid could be a new phase in the war between Ukraine and Russia as the latter has not been successful in winning the battle on the field.
11:22 - 18:32 (07:10)
listen on Spotify
Cybersecurity
Summary

The recent cyberattack on Ukraine’s power grid could be a new phase in the war between Ukraine and Russia as the latter has not been successful in winning the battle on the field. This persistent strategy might make it harder for Ukraine to sustain this war and the disruption caused could create an uneasy sense of normalcy.

Episode
A Bridge, a Bomb and Putin’s Revenge
Podcast
The Daily
Importance of Using Password Managers
The speaker shares his experience of using the same password for multiple accounts and the consequences he faced; urges the audience to use password management tools to avoid such situations.
26:11 - 30:08 (03:57)
listen on Spotify
Cybersecurity
Summary

The speaker shares his experience of using the same password for multiple accounts and the consequences he faced; urges the audience to use password management tools to avoid such situations.

Episode
#074 - Tiago Forte - The Definitive Guide To Digital Productivity
Podcast
Modern Wisdom
How Sinkholing Led to the Arrest of Mariposa Botnet Creators
Sinkholing was used to take away all the Mariposa botnet domain names, providing law enforcement with information to arrest the culprits behind the attack.
26:52 - 32:40 (05:47)
listen on Spotify
Cybersecurity
Summary

Sinkholing was used to take away all the Mariposa botnet domain names, providing law enforcement with information to arrest the culprits behind the attack.

Episode
94: Mariposa
Podcast
Darknet Diaries
Hacking and Protecting Celebrities with Guest John Boles
John Boles discusses the vulnerability of celebrities to hacking attacks due to their public image, and highlights the need for them to take extra measures to protect their valuable personal information.
2:43:06 - 2:45:31 (02:24)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

John Boles discusses the vulnerability of celebrities to hacking attacks due to their public image, and highlights the need for them to take extra measures to protect their valuable personal information.

Episode
#340 – Chris Tarbell: FBI Agent Who Took Down Silk Road
Podcast
Lex Fridman Podcast
Password Managers
The speaker discusses the importance of having a password manager to keep track of all your passwords, and suggests that products like One Password could benefit from better branding and user-friendly language to reach a wider audience.
15:49 - 20:22 (04:32)
listen on Spotify
Cybersecurity
Summary

The speaker discusses the importance of having a password manager to keep track of all your passwords, and suggests that products like One Password could benefit from better branding and user-friendly language to reach a wider audience.

Episode
#88 with Greg Isenberg (part 2) - Why Plugins Are Big Business
Podcast
My First Million
Lack of Laws and Treaties Surrounding Cybersecurity
The lack of laws and treaties regarding cyber security is a major issue, especially with recent events involving Russian hackers and the use of computer viruses such as Stuxnet.
45:15 - 48:03 (02:48)
listen on Spotify
Cybersecurity
Summary

The lack of laws and treaties regarding cyber security is a major issue, especially with recent events involving Russian hackers and the use of computer viruses such as Stuxnet.

Episode
Ep 358 - Fauci Ouchie (feat. Mike Recine & Sean McCarthy)
Podcast
Matt and Shane's Secret Podcast
Beware of Hacking
A cautionary tale about the dangers of hacking and how it can impact your personal relationships and online security.
38:12 - 39:54 (01:42)
listen on Spotify
Cybersecurity
Summary

A cautionary tale about the dangers of hacking and how it can impact your personal relationships and online security.

Episode
My Grandparents on Surviving Polio, How They Met & Life Without AC
Podcast
The Unplanned Podcast with Matt & Abby
Cybersecurity Threats and Protection Measures
The speaker shares a personal experience of a cybersecurity breach and advises to change passwords and consider getting new devices to protect personal information.
19:09 - 26:20 (07:10)
listen on Spotify
Cybersecurity
Summary

The speaker shares a personal experience of a cybersecurity breach and advises to change passwords and consider getting new devices to protect personal information. They suggest that there are more cybersecurity measures than what they discussed in the podcast.

Episode
S15 E11: [What Came Next Presents] SWW S9 Updates // Part 2
Podcast
Something Was Wrong
The Oil Pipeline Hack
The speaker asks if the other person had any involvement in the hacking of an oil pipeline along the East Coast that resulted in a $4.5 million ransom payment.
58:21 - 1:01:04 (02:42)
listen on Spotify
Cybersecurity
Summary

The speaker asks if the other person had any involvement in the hacking of an oil pipeline along the East Coast that resulted in a $4.5 million ransom payment. They mention knowing someone who works as a hacker but don't discuss his work.

Episode
Gigi Gorgeous and Howie Prank August Getty
Podcast
Howie Mandel Does Stuff Podcast