We Are Cyber Security Experts

We Are Cyber Security Experts

Up next

We Are Lobbying For A Ceasefire

In episode 331, the girls are talking about the death tolls for civilians, healthcare workers, and missing persons numbers in Gaza. Plus they get into the mainstream media's lack of journalistic integrity, how AIPAC and other Israeli lobbying groups work, South Africa's suit agai ...  Show more

We Are Done With Biden

In episode 330, the girls continue to talk about the genocide in Palestine, how Biden has lost the Arab and Muslim communities, the weather in Gaza, the truly disturbing Zionist talking points, and more.  FOOTNOTES: Remarks by President Biden at a Campaign Reception ‘A disservice ...  Show more

Recommended Episodes

Kevin Mitnick - The World's Most Famous Hacker | Mystery and Murder: Analysis by Dr. Phil
Mystery and Murder: Analysis by Dr. Phil

Cybersecurity expert and "the world's most famous hacker" Kevin Mitnick demonstrates some methods hackers use to access sensitive information, and gives valuable tips to keep yourself safe in the cyberworld. Dr. Phil says, "This is a time that it is really important because we're ...  Show more

How To Protect Yourself From Social Engineering Hacks
CYBER

Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ...  Show more

Flipping dating apps, and crypto rewards for criminals
Smashing Security

How to find your match on the Bumble dating app, convicted criminals make money out of cryptocurrency, and there are concerns about data in Afghanistan.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans ...  Show more

86: The LinkedIn Incident
Darknet Diaries

In 2012, LinkedIn was the target of a data breach. A hacker got in and stole millions of user details. Username and password hashes were then sold to people willing to buy. This episode goes over the story of what happened.

For a good password manager, check out

  Show more