Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Introduction
00:00 • 2min
How to Mitigate the Damage Done by Cyber Attacks
02:17 • 6min
The Dangers of Juice Jacking Attacks
07:53 • 6min
The Rise of Data Breach Lawsuits
13:27 • 6min
The Problem With Telegram's Freedom of Communication
19:00 • 4min
The Evolution of Misinformation Campaigns
22:57 • 4min
The Role of Trend Micro in Cyber Security
27:13 • 4min
How to Build a Professional Network on Linkedin
31:15 • 3min
The Rise of P I Security
33:56 • 6min
Bold Spy Malware in Use by the Law Enforcement Command of the Islamic Republic of Iran
39:31 • 3min
Windows Pop-Up Malware Targeting Ukraine
42:31 • 5min
The Alphv Ransomware Organization Behind the Recent Attack on Western Digital Revealed More Leak Data
47:44 • 5min
The Future of Cybersecurity
52:32 • 5min
How to Quit Your Job and Just Do Cyber Stuff Full-Time
57:36 • 4min
How to Make a Social Engineering Attack More Credible
01:01:48 • 3min


