Category Archives: social media

Podcast: Marcus Carey

 

Marcus-J-Carey_400x400

Marcus J. Carey

Marcus J. Carey is a cybersecurity researcher, hacker, and the founder and CEO of Threatcare. He describes himself as a hacker who helps people not suck at cybersecurity. He started his technology voyage in U.S. Navy Cryptology and later went on to refine his knowledge while working at the National Security Agency (NSA).

Tribe of Hackers

Marcus is also the author of a new book with Jennifer Jin entitled Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World. The book is a collection of interviews with 70 top hackers and is available now on Amazon. A free pdf of the book is available here.

Marcus sat down with me at the RSA Security Conference in San Francisco in March to discuss his path to a career in cybersecurity, the NSA, Edward Snowden, his book Tribe of Hackers, the future of the cybersecurity industry and much more.

DIRECT DOWNLOAD OF THIS EPISODE (MP3 FILE)

Subscribe on iTunes, Google and Stitcher!

 

Tagged , , , , , , , , , , , , , , , , , ,

PODCAST: Charles Tendell

Charles Tendell

Charles Tendell

This episode’s guest is North Carolina based security researcher and podcast host Charles Tendell. He joins the podcast to discuss his path to a career in cybersecurity, his experience dealing with Hurricane Florence, Hacker’s List, social engineering, political correctness, virtue signaling, racism, dating apps, cybersecurity pet peeves, Twitter drama, laying the pipe and more!

 

Check out The Charles Tendell Show and follow Charles on Twitter!

DIRECT DOWNLOAD OF THIS EPISODE (MP3 FILE)

Subscribe on iTunes, Google and Stitcher!

 

 

 

Tagged , , , , , , , , , , , ,

RSAC 2018 – Rachel Tobac & Joe Gray

Compromising a Fortune 500 Business without Hacking a Thing!

Rachel Tobac and Joe Gray present at RSAC2018!!

A simulated compromise of a Fortune 500 company as part of a social engineering competition will lead to discussion about how data was collected using open source intelligence (OSINT) beyond that of social media and tools. It will identify places to find data, providing insight for more valuable data sources. This will include a demo of OSINT techniques, phishing and a pretexting discussion.

Learning Objectives:
1: Learn how to defend against social engineering.
2: Understand the relative ease in collecting open source intelligence (OSINT).
3: Learn more about the tools and techniques used in social engineering.

CLICK HERE FOR THE SLIDES FROM PRESENTATION

CLICK HERE TO DOWNLOAD MP3 FILE

Tagged , , , , , , , , , , ,

PODCAST: Laurie Segall

Laurie-Segall-dead-irl-thumbnail-large-main

This episode my guest is Laurie Segall senior technology correspondent for CNN and editor-at-large for CNN Tech.

mh-dead-irl-text-conversation-1280x720

Laurie is host of CNN’s first CNNgo original, Mostly Human with Laurie Segall, a 6-part investigative docuseries, exploring sex, love, death & humanity through the lens of tech.

MH_mostly-human-smart-tv_1280x1280

Mostly Human follows Laurie around the world as she tackles the uncomfortable questions about our increasingly complicated relationship with technology. She examines the power modern technology holds, while exposing the darker side.

The full Mostly Human series streams exclusively on CNNgo.

You can access the series for free through CNNgo on Apple TV, Roku, Amazon FireTV, and Android TV.

It is also available on CNN.com, and CNN’s iOS and Android apps.

______________________________________________________________________________________

Mostly Human – Episodes

1 – Dead, IRL

Laurie-Segal-Mostly-Human-1

Using thousands of texts, tweets and Facebook posts, a woman creates a digital version of her best friend … after he died. Artificial intelligence and years of social media data allowed her to create a bot that responds like her best friend, jokes like him, and blurs the lines between man and machine. This is death in the digital age.

______________________________________________________________________________________

2 – Hacker down: ISIS’ Twitter star

MH_hussain_embed

An investigation into the first person deemed dangerous enough to kill… because of his ability to tweet. We explore the life and death of Junaid Hussain, the ISIS hacker who ushered in a new era of terror, mainly due to his social media celebrity. We infiltrate hacker circles in Vegas, explore undercover operations, and have a dangerous run-in outside his hometown, to understand how he went from computer nerd to third most dangerous member of ISIS.

______________________________________________________________________________________

3 – I love you, Bot

mostly-human-ilyb-realdolls-00003028-1280x720

Westworld, or real world? From people falling in love with robots to sex dolls who now have, “AI brains,” our relationship with tech is getting…complicated. We explore a sexual assault in the virtual world and Minority Report technology being used in a high security psychiatric ward. It’s too controversial for the US and will blow your mind.

______________________________________________________________________________________

4 – Silicon Valley’s dark secret

MOSTLY-HUMAN-JERRY-STILL-1

Dig into the myth of Silicon Valley – where heroes are hailed and success celebrated. Silicon Valley has a secret they don’t want you to know about. Much of the creative genius, the brainiac success stories are also associated  with depression and bi-polar disorder. Is there a price to creative genius?

______________________________________________________________________________________

5 – Swipe, Click, Cheat

ashmad_embed2

Explore the human impact of a hack that exposed 36 million potential cheaters. Behind the hack, there were suicides, broken families. We introduce you to the human impact of Ashley Madison and take our viewers inside the War Room of Ashley Madison where there were millions of dollars on the table, death threats, and a ticking time bomb that would explode with society’s secrets. We’ll also look at the company’s secret: their ability to program algorithms that would make you more likely to click-for-affair.

______________________________________________________________________________________

6 – Electric Sheep

mostly-human-electric-sheep-missed-connections-00003826-1280x720

A look at why the most powerful people in tech are stepping away from the products they’ve built. In a place where algorithms play god, we explore the soul searching Silicon Valley is doing.  The biggest CEO’s are raising the alarm bells and wondering – have we entered the singularity? Who’s in control… man or machine?

______________________________________________________________________________________

VITB CAMEO!

VITBonCNNgo

______________________________________________________________________________________

SUBSCRIBE TO VITB PODCAST:

googleplay-logo

1-logo-itunes

stitcher-logo

DIRECT DOWNLOAD MP3 OF PODCAST

______________________________________________________________________________________

Tagged , , , , , , , , , , , , , , , ,

PODCAST: Dataminr and The FIREHOSE

dataminr_logo-01

This episode is on Dataminr, a New York-based startup, which is authorized to analyze the entire Twitter “Firehose” of all live tweets and offer clients advanced social media analytics as a service in the form of digests and news updates.

Kerry Flynn (Mashable) and Russell Brandom (The Verge) have both been reporting on Dataminr and join the podcast to discuss its place in the social media landscape.

DarkExclusive access to information and data feeds, which include Twitter’s raw live tweets, allows Dataminr to filter the data to identify important events and business trends as they unfold and also act as an early warning system for major events like terrorist attacks, natural disasters and other public emergencies.

dataminr-product_map
Dataminr is Twitter’s only data partner that is also allowed to resell the complete stream of tweets and their clients include large hedge funds, mainstream news outlets, public relations firms, publicly traded corporations and major government entities including, law enforcement and intelligence agencies.

dataminr_isisThe DHS, FBI, and CIA have used the service to help with tracking  criminals and terrorists, but have also drawn the ire of the ACLU, who have challenged the use of Dataminr’s services by government agencies to monitor domestic protests.

SUBSCRIBE TO VITB PODCAST:

1-logo-itunesstitcher-logogoogleplay-logo

DIRECT DOWNLOAD OF MP3

Follow me on Twitter!

Tagged , , , , , , , , , , , , ,
%d bloggers like this: