Powered by RND
PodcastsTechnologieUnlocked 403 | Cybersecurity Podcast

Unlocked 403 | Cybersecurity Podcast

ESET
Unlocked 403 | Cybersecurity Podcast
Nieuwste aflevering

Beschikbare afleveringen

5 van 16
  • How Social Engineering Really Works
    Why do people fall for online scams even when they know the risks? In this episode of Unlocked 403, Becks is joined by Alena Košinárová, software engineer at ESET, to explore how attackers use psychological manipulation to trick their targets.They break down the most common tactics behind phishing, romance scams, sextortion, and impersonation. Alena explains why humans are still the easiest entry point for cybercriminals and how public data is often used to craft convincing attacks.In a surprising twist, Alena puts her skills to the test by social engineering Becks herself. Don't forget to like, comment, and subscribe for more insights into cybersecurity and tech!Topics:(00:00) – Intro(00:47) – Meet Alena Košinárová(01:13) – Career Journey(03:12) – What Is Social Engineering?(05:36) – Offline vs. Online Attacks(09:06) – Common Social Engineering Tactics(11:03) – Romance Scams(12:43) – Sextortion(15:54) – Deepfakes & Blackmail(17:46) – Can Security Tools Help?(19:35) – How Hackers Gather Info(20:24) – Social Engineering Demo(32:31) – Red Flags to Watch(35:02) – Top 5 Safety Tips(37:19) – OutroConnect With Us:Our Main Site: https://www.eset.com/int/X: https://twitter.com/ESETInstagram https://www.instagram.com/eset/Facebook https://www.facebook.com/esetLinkedIn https://www.linkedin.com/company/eset/TikTok https://www.tiktok.com/@eset_globalWeLiveSecurity blog https://www.welivesecurity.com/Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/YouTube: https://www.youtube.com/c/esetglobal
    --------  
    38:09
  • Is Your Phone Spying on You?
    In this episode of Unlocked 403, Becks is joined by Lukas Stefanko, leading malware researcher at ESET, to unpack the evolution of espionage in the digital age — and how our smartphones became a new battleground.They explore the shift from Cold War tactics to today’s silent threats, like spyware tools embedded in seemingly harmless apps. From the basics of what spyware is and how it operates, to real-world examples like BadBazaar and the infamous Pegasus, this conversation dives deep into how threat actors can turn phones into surveillance devices.Don’t forget to comment and subscribe!Topics:(00:00) – Intro (00:56) – Meet Lukas Stefanko (01:36) – Espionage: Then & Now (02:58) – Today’s Cyber Espionage Tools (03:57) – What Is Spyware? (05:58) – How Spyware Infects Devices (08:48) – Are Smartphones More Vulnerable? (12:37) – The BadBazaar Espionage Tool (17:34) – How Long Does Spyware Stay Active? (21:28) – Pegasus: Mobile Surveillance at Scale (24:36) – Government Use of Pegasus (26:30) – Can Spyware Tools Be Regulated? (27:18) – Removing Spyware from Your Device (30:10) – What About Military-Grade Spyware? (31:17) – Top 3 Tips to Stay Safe Online (32:45) – OutroConnect With Us:Our Main Site: https://www.eset.com/int/X: https://twitter.com/ESETInstagram https://www.instagram.com/eset/Facebook https://www.facebook.com/esetLinkedIn https://www.linkedin.com/company/eset/TikTok https://www.tiktok.com/@eset_globalWeLiveSecurity blog https://www.welivesecurity.com/Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/YouTube: https://www.youtube.com/c/esetglobal
    --------  
    33:56
  • Why Is Your Data Worth So Much?
    In this episode of Unlocked 403, Becks talks with Jake Moore, Global Security Advisor at ESET, about what it really means when we say “you are the product.”They explore how social media platforms collect and use our data, what risks that poses—especially for kids—and how users can take back some of the control.From data minimization to metadata, the right to be forgotten, and tips for staying safe online, this episode is packed with practical advice and insights.Don’t forget to like, comment, and subscribe!Topics:(00:00) - Intro(01:15) - Jake Moore returns(03:32) - If it's free, are you the product?(04:51) - Personally identifiable information (08:12) - Are you sharing too much online?(09:13) - Think twice before you post(12:04) - Fist-party vs. Third party data collection(14:43) - Data minimization(16:07) - Privacy settings to the rescue?(17:31) - Double-check Terms & Conditions(18:52) - What is metadata?(19:55) - Handling of metadata online(22:05) - Has data collection changed society?(24:18) - Ethics of data collection(26:48) - TOP 3 tips to stay safe online(28:23) - OutroConnect With Us:Our Main Site: https://www.eset.com/int/X: https://twitter.com/ESETInstagram https://www.instagram.com/eset/Facebook https://www.facebook.com/esetLinkedIn https://www.linkedin.com/company/eset/TikTok https://www.tiktok.com/@eset_globalWeLiveSecurity blog https://www.welivesecurity.com/Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/YouTube: https://www.youtube.com/c/esetglobal
    --------  
    29:17
  • How to get into Cybersecurity
    In this episode of Unlocked 403, cybersecurity podcast by ESET, Becks sits down with Robert Lipovský, Principal Threat Intelligence Researcher at ESET, to talk all things cyber!They dive into how they got started in cybersecurity, what it really takes to thrive in the field, and why a university diploma isn’t your only golden ticket. Whether you’re eyeing a technical path or a non-technical role, this conversation breaks down the skills, mindset, and passion needed to make it in this ever-evolving industry.Curious about a career in cyber? This one's for you.Don’t forget to comment, and subscribe for more from cybersecurity and tech!Topics:(00:00) - Intro(01:15) - Principal threat intelligence researcher(01:52) - How did Robert get into cybersecurity? (03:27) - QUIZ! (05:57) - A typical day in cybersecurity(07:58) - Research cycle(10:08) - Myths about cybersecurity(11:37) - How to start a cybersecurity career?(13:17) - Job diversity in cybersecurity (15:41) - What are the requirements? (17:01) - How much experience do you need to have? (19:19) - I hired a 17-year-old without a diploma(20:10) - Most in-demand skills in cybersecurity(21:40) - Cybersecurity communication(23:18) - Future of cybersecurity(24:21) - TOP 3 advice for a cybersecurity career(27:01) - OutroConnect With Us:Our Main Site: https://www.eset.com/int/X: https://twitter.com/ESETInstagram https://www.instagram.com/eset/Facebook https://www.facebook.com/esetLinkedIn https://www.linkedin.com/company/eset/TikTok https://www.tiktok.com/@eset_globalWeLiveSecurity blog https://www.welivesecurity.com/Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/YouTube: https://www.youtube.com/c/esetglobal
    --------  
    28:09
  • Can We Counter Online Disinformation?
    Why are we so quick to believe and share false information online? In this episode of Unlocked 403, Becks talks with the lead researcher from KInIT, Jakub Šimko, to explore how social media’s design and human psychology work together to fuel the spread of false information.Follow  @kinit_institute  KInIT websiteDon’t forget to like, comment, and subscribe for more from cybersecurity and tech!Topics:(00:00) - Intro(00:53) - Discover KInIT (02:01) - Misinformation vs. Disinformation(03:27) - The spread of false information(05:07) - Which topics gain the most traction?(06:31) - Evolution of disinformation tactics(07:50) - Is attention span at fault?(08:40) - How is false information created?(12:15) - Deepfake Quiz - Image sample(13:32) - Deepfake Quiz - Image sample(14:14) - Deepfake Quiz - Video sample(15:43) - Deepfake Quiz - Audio sample(18:05) - Deepfake Quiz - Results(18:43) - Why are we susceptible to misinformation?(21:05) - Seeing things from both perspectives(22:42) - AI to counter disinformation?(24:39) - Censorship(25:57) - Free speech vs. Content moderation(27:28) - Jakub Šimko's advice(28:33) - OutroConnect With Us:⁠⁠⁠⁠⁠X⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠Instagram⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠TikTok⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠Facebook⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠LinkedIn⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Our Main Site⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠WeLiveSecurity⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠Corporate Blog
    --------  
    29:16

Meer Technologie podcasts

Over Unlocked 403 | Cybersecurity Podcast

Cybersecurity Podcast - We want to bring cybersecurity to your ears, educate as well entertain you all at once. No worries, if you are new to the topic of digital security, we´ve got you covered. If you feel at home in cyberspace, we invite you to listen to experts from ESET, talk about their fascinating jobs as well as the latest threats and trends.
Podcast website

Luister naar Unlocked 403 | Cybersecurity Podcast, Cryptocast | BNR en vele andere podcasts van over de hele wereld met de radio.net-app

Ontvang de gratis radio.net app

  • Zenders en podcasts om te bookmarken
  • Streamen via Wi-Fi of Bluetooth
  • Ondersteunt Carplay & Android Auto
  • Veel andere app-functies

Unlocked 403 | Cybersecurity Podcast: Podcasts in familie

Social
v7.23.9 | © 2007-2025 radio.de GmbH
Generated: 10/20/2025 - 1:49:10 PM