goodlisten
Studio
​

GoodListen © 2023

About

Privacy Policy

Terms of service

Support

Blog

Search Podcasts

Podcasts

Categories
/

Cybersecurity

Cybersecurity

Chapters
Requesting Crazy Things From a Hacker
A hacker describes how he flexes his power by only communicating in person for extreme requests.
40:58 - 44:33 (03:35)
listen on Spotify
Cybersecurity
Summary

A hacker describes how he flexes his power by only communicating in person for extreme requests. However, most of the time they just talk broadly about things.

Episode
#12 Luis Chaparro - Inside Cartel Drug Operations
Podcast
Shawn Ryan Show
The Rise and Fall of a Software Pioneer
This episode discusses the rise and fall of John McAfee, the software pioneer who created the anti-virus software McAfee.
1:14:09 - 1:19:59 (05:49)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

This episode discusses the rise and fall of John McAfee, the software pioneer who created the anti-virus software McAfee. It delves into his unconventional methods of management and the legal troubles he faced due to his actions.

Episode
#566 - David Senra - Insights From History's Greatest Thinkers
Podcast
Modern Wisdom
The importance of encrypted communication
The speaker discusses his efforts to use encrypted phone apps like WhatsApp and Signal in order to keep his communication secure.
17:50 - 21:59 (04:08)
listen on Spotify
Cybersecurity
Summary

The speaker discusses his efforts to use encrypted phone apps like WhatsApp and Signal in order to keep his communication secure.

Episode
E8: TikTok + Oracle, how privacy loss will impact society, economy & COVID outlooks for 2021 & beyond, California wildfires & more
Podcast
All-In with Chamath, Jason, Sacks & Friedberg
The Threat of Cybercrime Today
The speed of technological development is accelerating, and cybercrime is evolving at the same pace, with the weaponization of code and an increase in the speed of DNA sequencing.
15:58 - 21:59 (06:00)
listen on Spotify
Cybersecurity
Summary

The speed of technological development is accelerating, and cybercrime is evolving at the same pace, with the weaponization of code and an increase in the speed of DNA sequencing. It is essential to ensure defense steps are taken and cybersecurity is being approached from a holistic perspective to prevent cybersecurity attacks in the future.

Episode
Ep 48: Marc Goodman, FBI Futurist, on High-Tech Crime and How to Protect Yourself
Podcast
The Tim Ferriss Show
Fighting Off Cyber Attacks as an Entrepreneur
The speaker discusses experiencing DDoS attacks on his entrepreneurial setup, and how it went on for months.
04:55 - 09:42 (04:46)
listen on Spotify
Cybersecurity
Summary

The speaker discusses experiencing DDoS attacks on his entrepreneurial setup, and how it went on for months. He also mentions how Periscope and Facebook Live have now made it easier for others to carry out similar attacks.

Episode
#29 - Powder Diets, Instagrammable Experiences & Distribution First
Podcast
My First Million
Cybersecurity Platform Features and Self-Acceptance
The speaker shares their advice in never choosing a business and the importance of multi-layer platform security features for cybersecurity.
54:22 - 58:28 (04:06)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

The speaker shares their advice in never choosing a business and the importance of multi-layer platform security features for cybersecurity. They also discuss the significance of accepting oneself even when struggling to understand certain things.

Episode
E204: Barbara Corcoran: Turning $1,000 to $1 Billion!
Podcast
The Diary Of A CEO with Steven Bartlett
Cybersecurity Knowledge Gap
The gap between the cybersecurity knowledge of investigators and kids involved in online communities needs to be filled, and this poses a challenge.
15:30 - 20:37 (05:07)
listen on Spotify
Cybersecurity
Summary

The gap between the cybersecurity knowledge of investigators and kids involved in online communities needs to be filled, and this poses a challenge. Parental controls prove inadequate for protecting children online.

Episode
MISSING: Alicia Navarro
Podcast
Crime Junkie
Russia’s cyberattack on Ukraine’s power grid
The recent cyberattack on Ukraine’s power grid could be a new phase in the war between Ukraine and Russia as the latter has not been successful in winning the battle on the field.
11:22 - 18:32 (07:10)
listen on Spotify
Cybersecurity
Summary

The recent cyberattack on Ukraine’s power grid could be a new phase in the war between Ukraine and Russia as the latter has not been successful in winning the battle on the field. This persistent strategy might make it harder for Ukraine to sustain this war and the disruption caused could create an uneasy sense of normalcy.

Episode
A Bridge, a Bomb and Putin’s Revenge
Podcast
The Daily
Ethical Whistleblowing and the Future of Cybersecurity
The host discusses the dilemma of whistleblowing in the tech industry with a concern for taking information out of context and incentives for creating false stories.
1:05:16 - 2:01:48 (56:31)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

The host discusses the dilemma of whistleblowing in the tech industry with a concern for taking information out of context and incentives for creating false stories. Additionally, the importance of ethical hacking in defense and cybersecurity is emphasized, along with creating boundaries for online interactions and speech to protect against malicious bots and division-sewing tactics.

Episode
#266 – Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar
Podcast
Lex Fridman Podcast
Beware of Hacking
A cautionary tale about the dangers of hacking and how it can impact your personal relationships and online security.
38:12 - 39:54 (01:42)
listen on Spotify
Cybersecurity
Summary

A cautionary tale about the dangers of hacking and how it can impact your personal relationships and online security.

Episode
My Grandparents on Surviving Polio, How They Met & Life Without AC
Podcast
The Unplanned Podcast with Matt & Abby
Cybersecurity Threats and Protection Measures
The speaker shares a personal experience of a cybersecurity breach and advises to change passwords and consider getting new devices to protect personal information.
19:09 - 26:20 (07:10)
listen on Spotify
Cybersecurity
Summary

The speaker shares a personal experience of a cybersecurity breach and advises to change passwords and consider getting new devices to protect personal information. They suggest that there are more cybersecurity measures than what they discussed in the podcast.

Episode
S15 E11: [What Came Next Presents] SWW S9 Updates // Part 2
Podcast
Something Was Wrong
Malware Identified in Network Traces Back to APT Group
The forensics team isolates the malware, studies it, and develops a profile for it, which leads them to link it back to an APT group.
03:13 - 10:00 (06:47)
listen on Spotify
Cybersecurity
Summary

The forensics team isolates the malware, studies it, and develops a profile for it, which leads them to link it back to an APT group. The team is hired to investigate and gather intel using their previous engagements and put some stuff in the network to look around.

Episode
Ep 11: Strictly Confidential
Podcast
Darknet Diaries
Blackmail Threat Due to Webcam Hack
The speaker received a blackmail threat after his webcam was hacked and used to film him during a private moment.
1:07:25 - 1:09:08 (01:43)
listen on Spotify
Cybersecurity
Summary

The speaker received a blackmail threat after his webcam was hacked and used to film him during a private moment. The hacker demanded money within 84 hours or else the video clip would be released to the speaker's contact list.

Episode
Ep 385 - Master Chief Ferrari Truck (feat. LeMaire Lee)
Podcast
Matt and Shane's Secret Podcast
The Oil Pipeline Hack
The speaker asks if the other person had any involvement in the hacking of an oil pipeline along the East Coast that resulted in a $4.5 million ransom payment.
58:21 - 1:01:04 (02:42)
listen on Spotify
Cybersecurity
Summary

The speaker asks if the other person had any involvement in the hacking of an oil pipeline along the East Coast that resulted in a $4.5 million ransom payment. They mention knowing someone who works as a hacker but don't discuss his work.

Episode
Gigi Gorgeous and Howie Prank August Getty
Podcast
Howie Mandel Does Stuff Podcast