Cyber Crime Junkies
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk.
Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
Cyber Crime Junkies
CYBERCRIME: How Will You FIGHT BACK?
New Episode🔥This one explores why news outlets focus on the aftermath of a data breach but rarely on the lives impacted. We discuss cybersecurity in the age of AI dangers and its impact on individuals. It's time we address what is cybercrime, the resulting cyber threats, and data protection including identity theft.
 
 Download your Take-Home Resources of Best Practices (No cost) here: https://offers.netgainit.com/psi-resources
 
 KEY TAKE AWAYS
🎯Data breaches have a profound emotional and financial impact on individuals.
 đźŽŻCybercrime is now a major global economy, surpassing even the drug trade.
 đźŽŻSmall and mid-sized businesses are more frequently targeted than larger corporations.
 đźŽŻCybersecurity is not just a workplace issue; it affects our personal lives too.
 đźŽŻFreezing credit is a simple yet effective way to protect against identity theft.
 đźŽŻAwareness and proactive measures can significantly reduce the risk of cybercrime.
 
 
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com  
 
🔥New Special Offers! 🔥
-  Remove Your Private Data Online Risk Free Today. Try Optery Risk Free. Protect your privacy and remove your data from data brokers and more. 
🔥No risk.🔥Sign up here https://get.optery.com/DMauro-CyberCrimeJunkies - 🔥Want to Try AI Translation, Audio Reader & Voice Cloning? Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq
 
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode! 
Dive Deeper: 
đź”— Website: https://cybercrimejunkies.com
Engage with us on Socials:
âś… LinkedIn: https://www.linkedin.com/in/daviddmauro/ 
📱 X/Twitter: https://x.com/CybercrimeJunky 
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Summary
New Episode🔥This video explores why news outlets focus on the aftermath of a **data breach** but rarely on the lives impacted. We discuss **cybersecurity** in the age of **ai dangers** and its impact on individuals. It's time we address **what is cybercrime**, the resulting **cyber threats**, and **data protection** including **identity theft**.
 
 Download your Take-Home Resources of Best Practices (No cost) here: https://offers.netgainit.com/psi-resources
 
 KEY TAKE AWAYS
🎯Data breaches have a profound emotional and financial impact on individuals.
 đźŽŻCybercrime is now a major global economy, surpassing even the drug trade.
 đźŽŻSmall and mid-sized businesses are more frequently targeted than larger corporations.
 đźŽŻCybersecurity is not just a workplace issue; it affects our personal lives too.
 đźŽŻFreezing credit is a simple yet effective way to protect against identity theft.
 đźŽŻAwareness and proactive measures can significantly reduce the risk of cybercrime.
 
 CHAPTERS: 
 
 00:00 Intro – Why data breaches are always in the news 
 00:25 The missing story – The human side of cybercrime 
 01:15 Every breach has a human fingerprint 
 02:10 Digital dependence – The illusion of transformation 
 03:00 How addicted are we to our phones? 
 03:45 Cybercrime: The third-largest economy on Earth 
 04:30 Small businesses hit hardest 
 05:00 AI at work – 77% using unapproved tools 
 06:00 Blurred lines – Home networks are now business networks 
 07:00 The stat that changes everything – 42% of breaches start at home 
 07:45 Password reuse and the myth of “it won’t happen to me” 
 08:30 The seatbelt analogy – Why cybersecurity needs guardrails 
 09:45 Free resources you can use right now 
 10:20 Freeze your credit – and your kids’ 
 11:00 Why 80% of identity theft could be stopped overnight 
 12:00 The neuroscience of social engineering 
 13:00 Amygdala hijack – why urgency makes us click 
 14:00 Pause and verify – the cure for 90% of attacks 
 15:00 Data brokers – 35,000 companies selling your info 
 16:00 Hackers aren’t hoodie kids – they’re organized crime 
 17:00 AI changes everything – trust is now weaponized 
 17:45 Deepfakes and cloned voices – when “seeing” isn’t believing 
 18:30 The next phish won’t come from a stranger 
 19:00 AI isn’t evil – it’s obedient 
 19:40 The exploitation zone – tech advancing faster than humans 
 20:30 The future of cybersecurity isn’t AI – it’s behavior 
 21:10 Take back control – simple steps to protect what matters 
 21:50 The real victims – people, not computers
 
 ==========================================================
 Feeling Kind? Consider Supporting Our Channel by subscribing! Over 84% of viewers do not subscribe to our channel! 
 
 đź‘ŤLike, Subscribe, and Comment on our Channel or this Video!
 
 âž•Join me on my other channels: Main Site | LinkedIn | X/Twitter | Meta/Instagram | 
 
 Dive Deeper: đź”— https://cybercrimejunkies.com 
 
🎧 Hit subscribe so you don’t miss the real stories behind the headlines. https://www.youtube.com/@cybercrimejunkies/featured 
 
 Catch Audio Podcast episodes:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941 
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3 
 =====================================================
 Get out of Debt and Budget for Your Money in Style:
đź“–Collective Budgeting: https://CollectiveBudgeting.com
 =====================================================
 đź”ĄNew Special Offers! 🔥
 1. Remove Your Private Data Online Risk Free Today. Try OPTERY Risk Free. Protect your privacy and remove your data from data brokers and more. 
 No risk.Sign up here (https://get.optery.com/DMauro-CyberCrimeJunkies) https://get.optery.com/DMauro-CyberCrimeJunkies 
 2. 🔥Experience The Best AI Translation, Audio Reader & Voice Cloning! Try Eleven Labs Today 🔥 Want Translator, Audio Reader or prefer a Custom AI Agent for your organization? Highest quality we found anywhere. You can try ELEVAN LABS here risk free: https://try.elevenlabs.io/gla58o32c6hq 
 ===================================================== 
 
 Partnership Opportunities:
 Interested in working together? Let's connect: https://cybercrimejunkies.com/
 
 DISCLAIMER: Some links may be affiliates and we may receive a small commission at no additional charge to you. Thank you for supporting our channel.
Keywords
cybersecurity for beginners,cyber security,cybersecurity,cyber security training for beginners,true crime stories,dark web,ai for beginners,cyber security explained,Information Security,hacker,cyber awareness,best ai tools,Hacking,cyber security tutorial,Sensitive Data Protection,Cybersecurity Awareness,first things first,Network Security,Incident Response,information security analyst,agentic ai,ai,ai tools,artificial intelligence,cyber crime junkies
Speaker 1 (00:09.548)
Why are data breaches always in the headlines but never about the people behind them? You know, the ones who clicked lost their life savings, had their lives flipped upside down. This isn't just cyber crime, it's real life. And AI, artificial intelligence, it's accelerating everything, including our mistakes. Today, we're exposing how trust is being weaponized and how you can fight back.
This is Cybercrime Junkies, and now the show.
Speaker 1 (00:51.982)
So why are data breaches always in the news? And what's missing from those stories? We hear about records stolen, systems locked, ransomware, and we saw in the last few days and it's still continuing on off and on with the big AWS outage that systems are recovering. But we rarely hear about the people.
the ones at the epicenter of the data breach, the ones who click the link, the ones who are busy and distracted or get socially engineered. They wind up suffering so much and their story is really never told. And it's something that we have to consider whenever we see these headlines in the news. They suffer identity theft, drained savings, sleepless nights.
wondering what else is taken, spending a lot of their what's left of their little free time working on fixing their identities, their credit and arguing with banks about funds stolen. And cybercrime isn't just about data. It's about all of us. Every breach has a human fingerprint, a mistake, a shortcut.
A click we didn't pause before making. And then comes the fallout, right? Bank accounts compromised, credit destroyed, mental and physical health unraveling under stress. We talk about firewalls, but the real firewall, the human firewall, it's broken. We have the highest dependence on technology than ever before in human history. We used to have two worlds, right?
We had an office, had computers in the office, and if something went wrong with them, okay, it was a little inconvenient, but overall we were fine, weren't we? We could still, we still had kinetic physical processes in place to take credit cards, to conduct, to render medical care, to conduct business, sales, follow-ups, et cetera. We weren't totally dependent.
Speaker 1 (03:15.456)
in our whole world on the technology. And all that's changed, right? We've traded those kinetic physical processes for digital transformation. We pay with our phones, we sign with our thumbs, we store our entire lives in clouds we've never even seen. We call it digital transformation. But the truth is,
It's digital dependence. And that dependence is a dangerous kind of faith.
You know, we pick up our phones on average 264 times a day. That's not transformation. That's addiction. There's a new cyber attack on a US organization every 11 seconds right now. Cybercrime now ranks the third largest economy in the world. There's the US, China, and cybercrime.
generates more revenue than the international drug trade for at least the last six years in a row and more revenue than Canada, Mexico and all of the European Union combined.
small to mid-sized businesses in fact get hit hardest. Right? Did you know that? Like overwhelmingly small to mid-sized businesses are the ones getting targeted the most and hit the most. The ones that make the news though are the household names obviously because otherwise mainstream media won't pick it up. And then a recent report came out I forget if it was IBM or Axios but
Speaker 1 (05:10.296)
They found that 77 % of employees of US companies, 77 % in a anonymous survey. So they're telling the truth. They all said that they were using unapproved AI tools at work. That creates a whole other list of risks, right? Because they can't defend or protect what they don't see. And
If we all using different things, there's no standardization. No one is being trained properly on how to prompt and how to avoid obvious risks like the AI browsers, the prompt injections, the data leakage, data loss prevention. There's a lot that's happening and a lot of it is in all of our controls.
Meanwhile, we sit there with TikTok on our phones. and over 80 % of us have our phones and our work email and our work systems all on the same device. Right. And meanwhile, we're curating our lives with apps that quietly track everything. The lines between home and work are have completely vanished. Right. Those are blurred lines. Now it used to be people would
head into the office, work, leave, right? There was a separation between work and your home life, no longer. Right, our mobile phones are available 24 seven. We have both our private lives, our hobbies and our work lives all on the same devices. And even if they're different devices, when we work from home, which a vast majority of people still do in some hybrid capacity,
then they're all on the same network. All protected along with internet of things devices and smart devices at home. All that have zero security because people don't go in and change those. I think about it. Our wifi routers connect our kids tablets, our smart doorbells, as well as business laptops, et cetera. All in one network.
Speaker 1 (07:33.006)
42 % of data breaches today actually start at what we're doing at home. 42%, that's a significant amount. And like I mentioned, 80-something percent of us use our phones both for personal and professional life. And then what else are we doing for our human firewall? How many of us have a really good password? Probably all of us. But how many of us use it for more than one app?
everybody. Right? Very few people actually use password managers. Very few of us. And it's something that is so simple to do and something we all need.
We keep thinking that work and home are separate. They're not. Right, we keep thinking cybersecurity, security awareness and things like that. That's for that boring stuff at work. That has nothing to do with my home life or my personal life. And that's completely wrong.
Speaker 1 (08:37.655)
I'll prove it. It took 80 years from the invention of the automobile and the internal combustion engine before seat belts were ever required. It took decades of denial before we admitted cigarettes were even killing people. But let me ask you, would any of you smoke three packs of Marlboro Reds a day and call it healthy?
Would you merge onto the interstate doing 90 miles an hour surrounded by semis with no seatbelt on today? How about with your loved ones in the car?
Exactly. Nobody with any sense would do that. Yet every day we scroll, post, and prompt like we're invincible, trusting that tech companies whose business model is not safety, their business model is data and ad revenue.
Seat belts didn't slow innovation of the automobile, right? They made driving sustainable for the long term. They saved lives, they reduced injuries. We need the same mindset when we think of cybersecurity and artificial intelligence. Guardrails aren't restrictions, they are survival tools. So, everybody that watches this video, there will be a link
in the show notes. I encourage you to check it out. We have simple, proven, effective resources that cost nothing, that show you all of the best practices, phone safety checklists, credit card fraud protection, travel and social media safety, child protection tips, step by step guides to freeze your credit and remove your data footprint from data breaches from data brokers. Let me tell you this.
Speaker 1 (10:45.33)
haven't if you haven't seen or met me before the number one thing you need to do is freeze your credit freeze your credit freeze your children's credit it costs nothing it helps your credit and after speaking with key cybercrime people they all admit openly on this on the show that
If Americans would freeze their credit, they couldn't do about 80 % of what they do to us. And it's free. It takes about 20, 30 minutes. Freeze your credit to three different bureaus. We show you exactly how to do it. There's no cost. We also recommend strongly to freeze the credit of your children or any minors that you're a guardian of or grandkids, et cetera. Why?
because those identities are used for decades. have had people on the show. We have talked to hundreds of them who, as they come of age, they find out, holy crap, I've got a foreclosed condo in Nevada in my name and I've got $180,000 worth of medical bills and now they have to declare bankruptcy. It's not a joke. This is real. protecting your digital life or
improving your digital cyber hygiene. Don't do it for work. Do it for you. Do it for your loved ones. Okay, do it so that you can enjoy gaming and enjoy your apartment and your house and all that stuff. Just protect it a little. The good news is look, they're not necessarily even targeting you, but you're going to get swept up. Cyber criminals generally, and I know
Many of them watch this. So, you know, I'm telling the truth. They're pretty optimistic. They're pretty opportunistic, right? They want cash grabs. They want to come in, hit hard and then leave. And we don't blame them. Right? America has done a lot of things to piss off a lot of people in a lot of countries. We know that. We didn't do it. The idiots that the public elected did. But you're hurting us.
Speaker 1 (13:12.408)
Here's the thing. In general, we've all shopped at Target, right? And picture the Target parking lot with hundreds of cars, right? If you wanted to break in and steal something from one of those cars, are you gonna take a crowbar and smash the windows and draw a bunch of attention? No. Not unless you work for Antifa and you just want attention. No. You wanna go by every single door.
Right? Blend in and just pull the door handles. Why? Because a bunch of people are going to keep those doors all locked. You're going to go in, you're going to take it from there. All you have to do in, in to protect yourself are some very basic low cost things. That's it. You just have to lock your doors. You just have to do a little bit so that they move on past you. That's the key. And that's the beauty of it.
is a lot of this is 100 % preventable. Freeze your credit and your kids, right? Fix your password reuse. I mean, there's a lot of good password managers out there. Keeper is fantastic. We've got links to that. Nord is fantastic. There's a bunch of them. There's a couple, you can Google it, you can search it online. There's a couple that have had issues, right? Don't go with them, but.
The other aspect is the neuroscience behind social engineering. When I say social engineering, mean somebody speaking with you, communicating with you through some app or email or phone. It's communication. A threat actor impersonating a trusted person trying to convince you to do something against your own interests. That's social engineering.
The neuroscience behind it shows that when they always create that sense of urgency or the sense of authority or something like that, they're triggering amygdala hijack. They're raising the cortisol levels in your brain and you cannot recall certain things. It uses the limbic part of your brain, the center part, right? And that drives behavior. It's instinctual, right? It is the Neanderthal
Speaker 1 (15:41.14)
view of there's a friggin wooly mammoth in our village we have to leave fight or flight right it drives that by pausing neuroscientists that we've had on this show have said it lowers the cortisol levels and allows the outer part of the brain the modern brain the neocortex that has the ability to comprehend and analyze vast amounts of data
It allows that to kick in. And from there, we can recall that we need to pause and verify. Doesn't matter what you do, what the ask is. If you pause and verify through a channel, if you're in an office, walk down the hall and ask the CFO, did you ask me to do this? Right. Or call them, text them at the number that you know they're at. If you do that.
None of this is going to happen, right? And data brokers are key to opt out of. Look, data brokers, there's 35,000 of them. Your data gets bought and sold and then resold and then resold. All it takes is one of those sets of your records and your credentials, et cetera, to be bought or on the dark web to be bought. And they no longer have to hack. They will literally just log in as you.
Because that's what they're doing today. When you think of a hacker, you picture a kid in a hoodie and live in his mom's basement drinking Red Bull all night with advanced technical skills? They are out there. Don't get me wrong. And they're brilliant. But they're not the majority. The majority of them are opportunistic, organized crime. Think more of the Sopranos than iRobot.
Right? Now there's also one more thing. Here's where the story kind of takes a turn. As AI has integrated into our technology dependence and addiction.
Speaker 1 (17:56.342)
It's accelerating everything. It's incredibly exciting. But right now trust is being weaponized. AI can diagnose diseases, but it can also design ransomware. It can write your business plan or a ransom note. Deepfakes can clone voices in less than 10 seconds. Now, many of you might be thinking, well, hey, I don't care. I'm not.
I'm not, I don't do public speaking. I don't have a lot of video of me out there. You, you have a voicemail on your phone. We've been able to have demoed it right here on the show. We've been able to create clones of voices from a voicemail. We've done it on the show. It's super easy. And then people cannot tell.
And we can make them say anything. We just type it in and it says it. You can adjust the, the syntax. You can make it sound exactly like the person. I mean, malicious actors use AI to sound like your CEO, your spouse or your child. And what that means is the next social engineering attempt isn't going to come from a stranger. It's going to come from someone you think you know.
Imagine you get a call from someone that sounds exactly like your boss or a trusted vendor. You act before you think. Right. That's the moment they're counting on. Or you get a phishing email and you remember you pause and you remember. But then it's followed by a calendar invite and on there will be a zoom or teams meeting and it'll be that trusted vendor or the boss.
and they will look and sound exactly like them. And they will ask you to do something. You have to verify through a legitimate means before you do anything releasing sensitive data.
Speaker 1 (20:10.956)
Here, when I say it's undetectable by the human eye, here's what I mean. I'm going to play a clip that'll demonstrate the current state of defect. Check out the current state of defects in this video clip. Criminals are. Here's how AI is trans. Sturbing new trend.
taking advantage, forming online crimes. Another layer of artificial intelligence. What could possibly happen if this gets into the wrong hands? This is happening quicker than any of us could have imagined. So I want to get you up to speed on what's happening with deep fakes. See, he's not believing anymore. We now have the ability to make people look like other people, like I could be Johnny or
You know, as an entity.
Speaker 1 (20:47.072)
in his
Speaker 2 (20:57.228)
I could be Nick the studio manager. Look, I'm Nick the studio manager right now. I could also be Tom the music composer. And what's crazy is even if you go back and watch what I just showed you frame by frame, you likely won't be able to tell how my face is slowly morphing into something else. And it's basically pixel perfect. Look, it's like amazing. I'm not me. I mean, I am me, but I'm not mean to you. And that's kind of nice.
It scares me. really does.
It's getting to the point where deepfakes are nearly impossible to decipher as computer generated, which is super exciting, but also kind of scary. FBI tells NBC News they're following the rapidly developing technology closely. Lawmakers and law enforcement are getting worried about this technology. Here's a letter.
from Congress to the Director of National Intelligence. Here is a 43-page report from the U.S. Department of Homeland Security. DHS says that deepfakes and the misuse of synthetic content pose a clear, present, and evolving threat to the public across national security, law enforcement, financial, and societal domains. The Pentagon is using its big research wing, the one that helped invent, I don't know, the GPS, the COVID vaccine, and the literal internet, that one, to look into deepfakes.
and how to combat them. Like, they're taking this very seriously. And then of course, deepfakes are being used for good old fashioned cybercrime. Like this group of fraudsters who were able to clone the voice of a major bank director and then use it to steal $35 million in cold hard cash. $35 million. What can be done? Let's first remember that when a new technology comes along, it typically evolves rapidly. Way faster than the lawmakers who need to understand it to regulate it do. So,
Speaker 2 (22:44.984)
We're in the kind of Wild West phase, where the lawmakers are kind of just trying to get their head around this stuff.
So, as we saw, right?
those making the rules and the guardrails have not caught up. are what Perry Carpenter over at Noble for the guy who wrote that fake F A I K book, which is brilliant. Follow Perry if, you don't already, but he calls it the exploitation zone. It's where technology has advanced faster than humans can comprehend.
And that's where we are. That's literally where we are today. Because trust is being weaponized and acting before we think, right, is the moment that attackers are counting on. mean, look, AI isn't good or evil. It's just obedient. It does exactly what we teach it. So the question we have to ask ourselves is what are we teaching it about us?
I mean, seeing is no longer believing.
Speaker 1 (24:02.424)
So when we think of the future of cybersecurity, look, it's not AI. AI is a tool and it's accelerating it. The future of cybersecurity is not AI, it's behavior. AI accelerates everything, including our mistakes. And it isn't evil, it's just obedient. The question is, what are we prompting?
What are we training it to do? So our ask of you is simple. Take back control. Protect everything that matters. Because it's more than just your work data.
Thanks. I'm Dean Morrow, part of FBI's InfraGuard and Vice President of Nekking Technologies. Every headline hides a story. A paralegal who reused a password and lost her job. A father whose 401k vanishes after identity theft. A rural hospital that pays a ransom and still loses patients. Cybercrime doesn't attack companies.
It attacks people. When you strengthen your personal cyber hygiene, your organization will win.
Speaker 1 (25:29.752)
So remember, the next time you see a breach in the news, remember this. It's more than just a headline. That's somebody's story.
Podcasts we love
Check out these other fine podcasts recommended by us, not an algorithm.