Cybersecurity Podcast - We want to bring cybersecurity to your ears, educate as well entertain you all at once. No worries, if you are new to the topic of digit...
Holiday cheer is in the air, but so are the scammers! In this festive episode of Unlocked 403, a cybersecurity podcast brought to you by ESET, we dive into the sneaky world of online Christmas scams. Becks is joined by Jake Moore, Global Security Advisor at ESET, to expose the tactics scammers use to exploit the holiday season—from fake shopping deals to phishing emails.
Stick around until the end for a surprise appearance you won’t want to miss!
Don't let scams ruin your holiday spirit and make this season merry and secure!
Follow Jake Moore:
LinkedIn
Topics:
(00:00) - Intro.
(01:04) - Who is Jake Moore?
(01:40) - Why is the holiday season a prime time for scammers?
(03:23) - Has AI changed scamming tactics?
(05:06) - What generation is more vulnerable to scams?
(06:28) - Targeted attacks.
(08:22) - Why are people falling for scams?
(09:57) - Most common attacks.
(11:03) - How do scammers use social media?
(13:46) - “Secret sister” scam.
(15:11) - Has Jake ever been scammed?
(16:29) - Data privacy tests by Jake.
(19:05) - Do not engage with scammers.
(20:15) - AI-Granny.
(21:32) - Deepfakes.
(24:06) - Future of deepfake scams.
(28:31) - What to do if you’ve been scammed?
(29:24) - Physical crime vs. Cyber-crime investigation
(32:48) - TOP 3 tips to stay safe online.
(33:23) - Favorite Christmas movie.
(34:32) - PRESENTS!
(36:15) - Outro.
Connect With Us:
X | Instagram | TikTok | Facebook | LinkedIn | Youtube
Our Main Site | WeLiveSecurity | Corporate Blog
--------
37:23
Is Your Business REALLY Cyber Secure?
In this episode of Unlocked 403, Becks dives deep into the ever-evolving world of B2B cybersecurity, discussing key strategies businesses need to adopt to protect their networks and data. From the infamous Blue Screen of Death (BSOD) to the intricacies of kernel access and Falcon sensors, this episode unpacks critical topics for IT professionals and decision-makers alike.
Joining Becks is Michal Jankech, VP of SMB, MSP, and Enterprise Segment at ESET, a global leader in cybersecurity solutions. Michal shares his expert insights on how companies of all sizes can fortify their defenses, adapt to emerging threats, and leverage cutting-edge technologies to stay ahead of the curve.
Follow Michal Jankech:
LinkedIn
Topics:
(00:00) - Intro
(00:53) - How did you get into cybersecurity?
(03:10) - Difference between B2C & B2B in cybersecurity
(04:45) - Biggest cybersecurity challenges for businesses
(07:14) - Human factor
(09:40) - Awareness VS Solution
(11:45) - Crowdstrike incident
(13:51) - Was it a security incident?
(15:15) - Crowdstrike and Microsoft
(18:06) - Consequences of the Kernel access limitations
(19:33) - Is built-in security enough?
(21:44) - Business-security tips
(24:47) - Train your users!
(25:14) - What about prevention?
(27:08) - Useful resources to stay updated
(29:04) - TOP 3 tips to stay safe online
(30:45) - Outro
Connect With Us:
X | Instagram | TikTok | Facebook | LinkedIn | Youtube
Our Main Site | WeLiveSecurity | Corporate Blog
--------
32:10
How to keep children safe online?
Hey, wanna chat?
A seemingly innocent message between adults, but between an adult and a child it can lead to grooming.
In this episode of Unlocked 403, a cybersecurity podcast brought to you by ESET, Becks sat down with Kamila Ryšánková, a child psychologist, to discuss what grooming is and why some kids may be more susceptible to falling prey.
Watch the episode and find out what you can do to keep your child safe online.
For more resources on grooming visit: saferkidsonline.eset.com
Topics:
(00:00) Intro
(01:16) What is grooming?
(02:06) Online VS offline grooming
(03:02) Who is targeted more: boys or girls?
(03:46) Groomer = Pedophile?
(04:31) Are some kids more susceptible?
(5:27) Isolating the child
(06:21) How do groomers prepare?
(07:51) Child's response to cybergrooming
(08:44) Why don’t kids share with their parents?
(10:18) Effects on the child
(12:45) Underreported crime
(13:09) Why parents don't report it?
(14:36) What should a child do?
(15:41) Preventing cybergrooming
(16:25) Internet = city
(17:02) Talking to kids about grooming
(17:51) Grandma rule
(18:38) Identifying groomers’ messages
(19:55) Red flags
(21:05) Top 3 advice for parents
(22:46) Parental control
(23:52) Outro
Connect With Us:
X | Instagram | TikTok | Facebook | LinkedIn | Youtube
Our Main Site | WeLiveSecurity | Corporate Blog
--------
24:56
Influencing the influencers
Join us for the 6th episode of ESET's Unlocked 403 podcast. This time, Becks spoke to Zuzana Legathova, Senior Manager of Analyst and Tester Relations, at ESET, explore future trends in cybersecurity and those on their way out. A must-listen for anyone interested in the evolving cybersecurity landscape.
Topics:
(00:00) Intro.
(1:00) What’s the Analyst Relations manager job?
(1:44) Are you spying?
(3:21) A day in the life of Analyst Relations.
(4:33) Analyst repost = Research?
(5:01) The impact of Analyst Relations.
(6:26) How are customers making decisions?
(7:31) Can you predict the future?
(9:44) Do criminals also look into the reports?
(10:52) Analysts VS. Testers
(12:33) Can the hardware be tested?
(14:17) What are the biggest Cybersecurity trends?
(15:08) What’s the “Zero trust”?
(16:52) Is Cloud security genuinely secure?
(18:04) Dying trend.
(18:57) We don’t use Antivirus anymore.
(22:44) Future risks.
(23:59) TOP 3 things to stay safe online.
(24:53) Should we be scared of Google?
(25:24) Outro.
Zuzana Legathova: LinkedIn
Connect With Us:
X | Instagram | TikTok | Facebook | LinkedIn | Youtube
Our Main Site | WeLiveSecurity | Corporate Blog
--------
26:28
Exploring Android Threats
Did you know a ducky can control your phone?
Welcome to Episode #5 of Unlocked 403, where we dive deep into Android security threats with Lukas Stefanko, a leading malware researcher at ESET.
In this episode, we explore some of the most intriguing and dangerous Android threats Lukas has encountered in his career, and he also shares crucial tips on how to stay safe online and protect your personal information.
Watch the full episode on our Youtube channel as we perform 3 live demonstrations revealing how easy it is to take control of your device. This is a must-watch!
Topics:
(00:00) Intro
(01:05) Let’s talk about Malware
(02:30) Does it get easier to discover harmful code?
(03:30) What sparked your interest in Android threats?
(04:35) What are the most common types?
(05:15) Do people still get tricked by Phishing?
(05:59) How could malicious apps get into your phone?
(07:32) How to recognize compromised applications?
(08:28) Andriod vs. iOS - which is better
(10:55) Security of the app stores
(13:30) It’s not just antivirus anymore
(14:10) What’s the most interesting Android threat you´ve ever seen?
(16:05) Attacking devices
(16:46) Demo 1: Exploiting physical security with Flipper Zero
(18:42) Demo 2: Exploiting Wi-Fi security with M5StickC
(22:00) Demo 3: Bluetooth vulnerability in unpatched Android device
(25:14) How are we protecting people from these types of attacks?
(26:22) App Defense Alliance
(27:16) TOP 3 things to stay safe online
(28:39) Outro
Follow Lukas Stefanko:
X | LinkedIn
linkt.ree/mobilehacker
Connect With Us:
X | Instagram | TikTok | Facebook | LinkedIn | Youtube
Our Main Site | WeLiveSecurity | Corporate Blog
Cybersecurity Podcast - We want to bring cybersecurity to your ears, educate as well entertain you all at once. No worries, if you are new to the topic of digital security, we´ve got you covered. If you feel at home in cyberspace, we invite you to listen to experts from ESET, talk about their fascinating jobs as well as the latest threats and trends.