goodlisten

Clip

The 2016 World Bank Breach Investigation
listen on Spotify
38:54 - 42:07 (03:12)

A look into the 2016 World Bank data breach, which resulted in the loss of private employee data, and the questionable security practices that may have contributed to the incident.

Similar Clips
A hacking expert speculates that it's technically possible for US Cyber Command to decrypt the private chat messages of ISIS media via stealing the private decryption keys of their phones.
17:34 - 22:09 (04:34)
listen on Spotify
US Cyber Command
Summary

A hacking expert speculates that it's technically possible for US Cyber Command to decrypt the private chat messages of ISIS media via stealing the private decryption keys of their phones.

Chapter
The Power of Cyber Command in War
Episode
Ep 50: Operation Glowing Symphony
Podcast
Darknet Diaries
The team found malware in the memory, but upon closer inspection discovered a note by the malware writer that was meant for forensic investigators looking for it.
33:07 - 34:19 (01:11)
listen on Spotify
Cybersecurity
Summary

The team found malware in the memory, but upon closer inspection discovered a note by the malware writer that was meant for forensic investigators looking for it.

Chapter
Importance of Immediate Management Action in Response to Malware Detection
Episode
103: Cloud Hopper
Podcast
Darknet Diaries
A former FBI Agent raised concerns about document retention issues in an interview.
31:37 - 33:12 (01:35)
listen on Spotify
FBI
Summary

A former FBI Agent raised concerns about document retention issues in an interview. The agent was able to find evidence related to a case that was stored in an improper location, and questions if proper steps were taken and documented.

Chapter
Unsolved Case Files: Marjorie "Christy" Luna
Episode
Marjorie Sue Fithian (Wild Card, Colorado)
Podcast
The Deck
Security breaches must be communicated to management immediately, even if the details of the breach are not yet fully understood.
24:21 - 30:25 (06:04)
listen on Spotify
Security breaches
Summary

Security breaches must be communicated to management immediately, even if the details of the breach are not yet fully understood. The consequences of the breach must be made clear and management must take steps to control the situation from all perspectives.

Chapter
Importance of Immediate Management Action in Response to Malware Detection
Episode
103: Cloud Hopper
Podcast
Darknet Diaries
An overview of the minimum prison sentences for child sexual abuse material and child sex trafficking across state lines.
17:55 - 24:03 (06:07)
listen on Spotify
Child Sexual Abuse Material
Summary

An overview of the minimum prison sentences for child sexual abuse material and child sex trafficking across state lines. The speaker highlights the importance of being creative in detecting child sexual abuse material and using available technology to process data faster.

Chapter
Identifying Child Sexual Abuse Material and Dark Web Criminals with Geospatial Units
Episode
NEW SHOW: Dark Arenas
Podcast
Crime Junkie