• 00:34

    Retail Hacking: What To Expect This Holiday Season

    in Technology

    It’s been a year since Target was breached, the first in a series of infamous attacks that culminated in a watershed year of retail breaches.  Over the past 12 months, retailer after retailer have disclosed that their systems had been infiltrated and customer payment information stolen. Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals? We’ll take look at what to expect from attackers—and their retailer targets.

  • 01:59

    RadioFreeRover Presents Make Shin a host show

    in Fun

    Police around the globe shut down dozens of underground cyber marketplaces that dealt in drugs, weapons and other illegal goods in a massive operation this week to disrupt criminals operating on the "Dark Web."


    Police in 17 countries arrested at least 17 website administrators, vendors and cybercriminals as part of the operation that targeted cyber storefronts where vendors put illegal goods on display much like Amazon or eBay sell legal goods.


    The sites hide from law enforcement on the "Dark Web" by using The Onion Router, or TOR, an underground computer network that relays cyber communications through at least three separate computers to disguise the Internet addresses of its users. Domain names for websites on the TOR network end with .onion.


    Law enforcement agencies from Europe, the U.S. and Canada, working from Europol's coordination center in the Netherlands, seized the servers that hosted the illegal marketplaces and took control of more than 400 .onion domains. The marketplaces knocked offline include SR2, Hydra, RepAAA, Hidden Empire, Cloud Nine, Black Market and Cannabis Road, Pandora, Blue Sky and Golden Nugget, Europol said. Police dubbed the operation "Onymous," the antonym of anonymous.


    Police also seized cash, bitcoin, drugs, gold and silver.


    Plus a special guest!


    Join Shin and myself tonight!

  • 00:03

    Better Ways to Pay for College

    in News

    American families are getting smarter about paying for college and which of your numbers do cybercriminals covet. WSJ's Mathew Passy reports.

  • 00:31

    Cyberstalking for Fun & Profit

    in Internet

    Does the title of this week's episode creep you out?  Good, because more and more intimate personal information is available online about each and every one of us than is "healthy."  Worse still is that's it's all too easy to become a victim of cyberstalking.  That's because most of us disseminate far too much personal information on social nets, in chatrooms,and via photo and video sharing services.  It's also far too easy to get the vast majority of us to volunteer even more intimate details regarding our religious and political affiliations, income, sexual orientation, and health-related issues. Worst of all, there are companies and cybercriminals that profit from this glut of easily obtained information. The result? We're all putting our personal and financial futures at risk.  During this episode we'll show you how easy it is to glean reams of information about nearly anyone -- and importantly -- what you need to do to keep yourself from getting caught with your pants down.  And if that doesn't creep you out, I don't know what will.

  • 02:01

    Lulabee wants you to Beware of Fake or Phishing ObamaCare Websites

    in Current Events

    Join Lulabee and her Co- Host #MrMarkSaidIt!  as they breakdown the new scams designed to steal your personal information and other things you should be on the the look out for.


    Persons who wish to sign-up or register for Obama Health Care should note that there are hundreds of fake ObamaCare websites. Cybercriminals have created these fake websites to steal their potential victims' names, addresses, Social Security numbers and other information.


    Please note that the legitimate ObamaCare website is located at http://www.healthcare.gov/ and you should not sign-up, enroll or register with any other website.


    Before you enter any information while registering for ObamaCare, please ensure that your web browser address bar looks like the following:


    One of the fake ObamaCare websites that thousands of persons have already visited is located at this website address:
    hxxp://www.obama-care.us/.


    If you enter your Social Security number, personal, health and other sensitive information on this bogus website, it will be sent to the cybercriminals behind this scam.


    You wont believe all the other things scammers can do with your information.


    Lets talk about it and the lulabee live show give you some valuable information.


    We will also talk about the passing of Nelson Mandela.


     

  • 00:32

    Protect Your Startup from Cybercriminals

    in Business

    Like all predators, cybercriminals gravitate towards the weakest targets. With an arsenal of easily-distributed malware at their fingertips, hackers can infect your office with malware that will wipe out your machines, steal the financial data of your customers, or worse, hijack bank transactions. For your startup or small business, an incident like this could cause financial ruin. Gary Mullen, Vice President of Corporate Marketing at Kaspersky Lab, will share his five tips to protect your business from cybercrime hackers, malware infestations, accidental loss of data and malicious or inadvertent catastrophes.

  • 00:36

    Proactive APT and Root Abuse Mitigation Techniques

    in Technology

    With growing numbers of cybercriminals and nation state actors intent upon stealing your electronic assets, disrupting your business operations and pilfering your intellectual property, you now need proactive strategies in place to mitigate risks that go beyond a traditional perimeter firewall. The most dangerous data theft threats are coming from the internal privileged user - not always the actual user, but often an external party that compromised a privileged user with Advance Persistent Threat (APT) tactics. Allowing privileged users, such as database, server, hypervisor, cloud infrastructure and storage admins, access to sensitive data unnecessarily increases the risk surface of your business and greatly simplifies an APT's mission of stealing your most valued data.  In this podcast Caleb Barlow will be joined by Vormetric Executives: CEO Alan Kessler and CSO Sol Cates, and the 2BSecure President and Former Chief Information Security Officer, Central Intelligence Agency (CIA), Bob Bigman.  We will discuss the latest data-theft trends and modern techniques to protect your data as close to the source as possible with data centric security and data firewalls across physical, virtual, private cloud and public cloud environments.  The solution will include exploration of IBM InfoSphere Guardium products, encryption techniques, strong policy controls, and security intelligence.
    Topics or interested parties may also include SafeNet, Trend Micro, Oracle, NTAP, VMware, AWS, Imperva customers using or considering TDE, FDE, volume encryption, privileged users access management (PAM), Database Account Monitoring (DAM), Vulnerability assessment tools, data discovery and data leak prevention (DLP) .  

  • 01:18

    Computer America - July 19, 2013

    in Technology




    Computer America

    Hour one: KnowBe4.  Digital crime is on the rise-a type of crime in which your credit, financial security and good name are at risk. Identity theft is now considered to be one of the fastest-growing crimes in America, made worse by the fact that criminals do not discriminate-cybercriminals are now targeting children. As cybercriminals begin focusing their efforts on 6 to 16 year-olds, Internet security awareness training firm KnowBe4 advises parents to take the threat seriously and to quickly enact safety measures to limit risk for their children. 

    Hour 2: Craig and Ben do Computer and Technology News and answer your computer questions!



     

  • 00:32

    Taking Out the Trash - Hackers Sliced Up

    in Internet

    While hacking has grown more pervasive in recent years, what most people don't realize is that it has evolved into a number of niche's that are designed to gain access to everything from your PC and notebook to your cellphone.  Once inside your computer, these trojan horses can do everything from allow third parties to rifle your files, spy on you by turning on your computer's built-in camera, and in some cases take complete control of your computer.  While there are software-based defenses that can be employed to identify and nullify these threats, most people aren't even aware that they have been hacked until it is too late.  So if you hope to take out the trash before cybercriminals invade your computer, tune into this episode of Working the Web to Win.

  • 02:02

    Questions the Medias Aren't Asking

    in Politics Conservative

    http://lessbull.com/2012/10/28-good-questions-that-the-mainstream-media-should-be-asking/
    Rebroadcast
    We discussed the questions the media should be asking but isn't. Some of these important inquiries are:
    Will the U.S. dollar soon lose its status as the primary reserve currency of the world?
    How in the world can you have a debate about the economy that lasts for an hour and a half and never even mention Ben Bernanke, the Federal Reserve or quantitative easing?
    Why is the mainstream media ignoring a warning that an international gang of cybercriminals plans “to steal money from the online accounts of thousands of consumers at 30 or more major U.S. banks“?
     Why is the United Nations pushing to have the authority to impose “global taxes” on all of us?
    How was one Baltimore woman able to accumulate 30 free cell phones all paid for by the federal government?
    Why has the birth rate in the United States fallen to an all-time low?
     Is the U.S. Supreme Court about to make it illegal to resell our own stuff at yard sales, in thrift stores and on eBay?

  • 02:02

    28 Good Questions that the Media Should be Asking

    in Politics Conservative

    http://lessbull.com/2012/10/28-good-questions-that-the-mainstream-media-should-be-asking/
    Callers and Chat Participation Welcome.
    Tonight we discuss the questions the media should be asking but isn't. Some of these important inquiries are:
    Will the U.S. dollar soon lose its status as the primary reserve currency of the world?
    How in the world can you have a debate about the economy that lasts for an hour and a half and never even mention Ben Bernanke, the Federal Reserve or quantitative easing?
    Why is the mainstream media ignoring a warning that an international gang of cybercriminals plans “to steal money from the online accounts of thousands of consumers at 30 or more major U.S. banks“?
     Why is the United Nations pushing to have the authority to impose “global taxes” on all of us?
    How was one Baltimore woman able to accumulate 30 free cell phones all paid for by the federal government?
    Why has the birth rate in the United States fallen to an all-time low?
     Is the U.S. Supreme Court about to make it illegal to resell our own stuff at yard sales, in thrift stores and on eBay?

Results Per Page: 12 | 24 | 48

Join Host Live Chats

Loading...
Loading...