Does hearing about a true crime case always leave you scouring the internet for the truth behind the story? Dive into your next mystery with Crime Junkie. Every Monday, join your host Ashley Flowers as she unravels all the details of infamous and underreported true crime cases with her best friend Brit Prawat. From cold cases to missing persons and heroes in our community who seek justice, Crime Junkie is your destination for theories and stories you won’t hear anywhere else. Whether you're ...
…
continue reading
Deep dive into true crime… where real life can be stranger than fiction! Let me know if there’s any cases you’d like to hear about! You can reach me at [email protected]
…
continue reading
Hey there, Tax Crime Junkies! For those of you who are new to our show, Tax Crime Junkies is the true crime podcast that combines our love of taxes and crime, and we’re here to bring you the inside scoop on some of the most fascinating tax-related cases out there. As tax experts and practitioners ourselves, Dom and Tom are uniquely qualified to uncover the most intricate details of these cases, and we’re not afraid to go deep. We know the ins and outs of the tax system, and we’re passionate ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
A deep-dive into Netflix's Abducted in Plain Sight Cover art photo provided by David von Diemar on Unsplash: https://unsplash.com/@davidvondiemar
…
continue reading
A young soldier, home on leave, should have been safe in his own neighborhood. Instead, 19-year-old Solomon Robinson was murdered in a park full of people — but no one has ever come forward to say what really happened. Decades later, his family is still searching for justice, and detectives are hoping someone will finally break the silence. The FBI…
…
continue reading
David Mauro interviews ransomware negotiator, George Just, a former VP at Oracle and current CRO at Digital Asset Redemption (https://www.digitalassetredemption.com/), about how to deal with online extortion, understanding ransomware payments, and we uncover secrets to cyber crime discussions you need to know. Chapters 00:00 The Reality of Cybercri…
…
continue reading
In this gripping episode of Tax Crime Junkies, we dive deep into the rise and fall of Gina Champion-Cain, a woman who once enjoyed the high life of San Diego’s real estate elite—until she became the mastermind behind one of the most infamous Ponzi schemes in history. Gina Champion-Cain, self-proclaimed “nice Catholic girl from Michigan,” made a nam…
…
continue reading
Discussed how start a career in cybersecurity today with military veteran and security teacher, trainer and expert, Josh Mason. Covering what employers want in cybersecurity, new approaches to enter cyber security, how transition fro military into cybersecurity today, new approaches to enter cybersecurity, how start a career in cybersecurity today,…
…
continue reading
Zero Trust. New Approaches to Social Engineering. Video Episode: https://youtu.be/U-RiapHidco We discuss new approaches to understanding zero trust and new approaches to understanding social engineering with Ron Woerner. Ron is a Keynote Speaker, Tedx Speaker, Author, Security Community Leader, CEO of Cyber-AAA, Professor of Cyber Studies, CISO, Ha…
…
continue reading
In early 2025, Oracle faced two significant cybersecurity breaches that exposed sensitive data and raised serious concerns about its security practices. The first breach involved outdated Cerner servers, compromising healthcare data, while the second targeted an inactive legacy system, leading to the theft of client credentials. Both incidents high…
…
continue reading

1
Hunting Down Hackers. John Hammond Exclusive.
1:00:59
1:00:59
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:00:59Hunting Down Hackers. True Crime Stories with Huntress/YouTube Leader John Hammond. Video episode here: https://youtu.be/CMOu0o9FvFQ Examples with advice from top security content creator JOHN HAMMOND. Understanding the Cyber Crime Mind To Protect Business, top security content creator insight, recent true cyber crime examples, new findings on cybe…
…
continue reading
Episode Summary: What happens when the person sworn to protect your paycheck is secretly shopping for a yacht on the company dime? In this episode of The Fine Line Files, Dom dives solo into the murky waters of leadership corruption—from union bosses with designer tastes to corporate execs who think “transparency” is a four-letter word. Building of…
…
continue reading
What if the hackers are actually the heroes? In this mind-blowing episode, host David Mauro sits down with Matt Toussain, elite military cyber warrior, DEF CON speaker, and Founder of Open Security, to reveal how offensive security and real-world hacking tactics are helping businesses reduce risk, fight cybercrime, and stay ten steps ahead of threa…
…
continue reading
We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Find out more about Dr Marono, her research and findings at https://www.abbiemarono.com/ Send us a text Growth witho…
…
continue reading
🚨 NEW EPISODE ALERT 🚨Joined by Brett Johnson, who EXPOSES the MIND of Cyber Crime. Once known as the "Original Internet Godfather" and US Most Wanted cybercriminal, Brett is now a cybersecurity consultant aiding law enforcement. Brett shares his remarkable journey of redemption, and we explore the mind of cyber crime and what drives criminals to co…
…
continue reading

1
MURDERED: The Feeney Family
1:05:24
1:05:24
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:05:24When the family of a beloved high school teacher is brutally killed, investigators race to make sense of a chaotic crime scene that defies simple explanation. They find themselves asking: was the whole thing staged? And if so, who staged it and why? We highly recommend listening to season 2 Anne Roderique-Jones’ podcast, Ozarks True Crime. You can …
…
continue reading
Chris Hadnagy, Best-selling author, security expert and CEO of Social Engineer, LLC, join sus to discuss hacking humans using sacience. Topics: understanding science in social engineering, hacking humans using science, neuroscience behind social engineering, science supporting social engineering, psychology of social engineering explained, how neur…
…
continue reading
Inside Espionage What Every American Should Know. Inside Truth Behind Data Breaches. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Impact of Chinese Espionage on US Businesses and Innovation Insi…
…
continue reading
After a woman goes missing, it’s up to law enforcement and her children to make sure justice is served. But listen closely, because we think there might be more crimes out there connected to this case that are yet to be solved… If you or a loved one is experiencing domestic abuse of any kind, you are not alone. You can call the National Domestic Vi…
…
continue reading
There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Threat of Chinese Espionage to American National Security Inside Espionage: What Every American Should Know Send us a text Growth without Interruptio…
…
continue reading
🚨New Episode 🚨We dive into PowerSchool Exposed-- Children at Risk at School, about the significant cybersecurity breach at PowerSchool, which exposed sensitive data of millions of students and teachers. It emphasizes the importance of transparency, accountability, and robust cybersecurity measures in protecting sensitive information. Takeaways Cybe…
…
continue reading
We expose and discuss the rise and fall of genetic testing company 23andMe. On September 13th, 2024 the once popular genetic testing company “23andMe” agreed to a $30 million settlement stemming from a data breach that affected nearly 7 million users. The next day, on September 14th every single board member resigned. Victims of the data breach are…
…
continue reading
This is story of how they caught Elizabeth Holmes and the rise and fall of THERANOS. From youngest female billionaire to convict. The technology never worked as promised. Was her intent to hope that the tech would “catch up” to what they had promised investors and regulators? Or had Theranos and Elizabeth Holmes crossed the line of NO return when t…
…
continue reading
In this week’s episode of Tax Crime Junkies, we take you behind the badge into one of the most shocking scandals to hit the Massachusetts State Police union. Meet Dana Pullman, the union boss who turned SPAM (State Police Association of Massachusetts) into his personal piggy bank. From backdoor kickbacks to romantic getaways funded by union dues, P…
…
continue reading
Brett Johnson joins us to talk about spotting fraud before its too late. We discuss how to limit cyber risk for small business, ways to identify refund fraud, AI implications in cyber security today, best policies to limit cyber liability and how can we spot fraud in business. We discuss how to protect families online, latest security expert insigh…
…
continue reading

1
INFAMOUS: The Death of John O'Keefe & The Trial of Karen Read
1:39:30
1:39:30
Riproduci in seguito
Riproduci in seguito
Liste
Like
Like aggiunto
1:39:30John O’Keefe, a 16-year veteran of the Boston Police Department, died of blunt force trauma and hypothermia on January 29, 2022, after being found on a fellow Boston Police Officer’s front lawn during a blizzard. His girlfriend, Karen Read, is charged with allegedly backing into John with her SUV, and leaving him to die in the cold after a night of…
…
continue reading
The conversation delves into the rise and fall of Charlie Javice, a once-celebrated fintech entrepreneur whose startup, Frank, promised to revolutionize student financial aid. However, her claims of a vast user base were fabricated, leading to a high-profile trial for fraud. The discussion highlights the implications of her actions on Silicon Valle…
…
continue reading
This is the True Cyber Crime Story of Ruja Ignatova A/K/A The Crypto Queen, on the FBI’s Top 10 MOST WANTED. She is wanted and remains at large. It's alleged to be the single largest Crypto currency Ponzi scheme in history. Three main players, Ruja Ignatova (The Crypto Queen), her brother Konstantin and Sebastian Greenwood (the public face of ONECO…
…
continue reading
🔥 Stay with us as we explore The SONY hack-decoded and take you Behind Scenes with a Real Hacker. In this episode we go Behind Scenes with A Real Hacker where Cyber Crime Junkies, host David Mauro, interviews Cody Kretsinger, a former Lulzsec member, exploring the Sony Hack Decoded. Guest Cody Kretsinger shows us how hacktivists help keep businesse…
…
continue reading
Expert Ayelet Biger of Scam Rangers joins us for Shocking Fraud Attempts To Watch Out For and even more shocking ways to protect personal data and best practices fraud protection. We address newest stories on account take overs and discussed how to protect families online, how can we spot fraud in business, how to protect employees online, how to p…
…
continue reading
The Fine Line Files: Life Insurance and Fraud – When Death Becomes ProfitableEpisode Summary: Life insurance is meant to provide financial security for loved ones after a loss. But what happens when a policy becomes a motive for crime? In this episode of The Fine Line Files, we explore the dark world of life insurance fraud—from suspicious claims t…
…
continue reading