Avsnitt

  • Hey, wanna chat?

    A seemingly innocent message between adults, but between an adult and a child it can lead to grooming.

    In this episode of Unlocked 403, a cybersecurity podcast brought to you by ESET, Becks sat down with Kamila Ryšánková, a child psychologist, to discuss what grooming is and why some kids may be more susceptible to falling prey.

    Watch the episode and find out what you can do to keep your child safe online.

    For more resources on grooming visit: saferkidsonline.eset.com

    Topics:

    (00:00) Intro

    (01:16) What is grooming?

    (02:06) Online VS offline grooming

    (03:02) Who is targeted more: boys or girls?

    (03:46) Groomer = Pedophile?

    (04:31) Are some kids more susceptible?

    (5:27) Isolating the child

    (06:21) How do groomers prepare?

    (07:51) Child's response to cybergrooming

    (08:44) Why don’t kids share with their parents?

    (10:18) Effects on the child

    (12:45) Underreported crime

    (13:09) Why parents don't report it?

    (14:36) What should a child do?

    (15:41) Preventing cybergrooming

    (16:25) Internet = city

    (17:02) Talking to kids about grooming

    (17:51) Grandma rule

    (18:38) Identifying groomers’ messages

    (19:55) Red flags

    (21:05) Top 3 advice for parents

    (22:46) Parental control

    (23:52) Outro

    Connect With Us:

    ⁠⁠⁠X⁠⁠⁠ | ⁠⁠⁠Instagram⁠⁠⁠ | ⁠⁠⁠TikTok⁠⁠⁠ | ⁠⁠⁠Facebook⁠⁠⁠ | ⁠⁠⁠LinkedIn⁠⁠⁠ | ⁠⁠⁠Youtube⁠⁠⁠

    ⁠⁠⁠Our Main Site⁠⁠⁠ | ⁠⁠⁠WeLiveSecurity⁠⁠⁠ | ⁠⁠⁠Corporate Blog

  • Join us for the 6th episode of ESET's Unlocked 403 podcast. This time, Becks spoke to Zuzana Legathova, Senior Manager of Analyst and Tester Relations, at ESET, explore future trends in cybersecurity and those on their way out. A must-listen for anyone interested in the evolving cybersecurity landscape.

    Topics:

    (00:00) Intro.

    (1:00) What’s the Analyst Relations manager job?

    (1:44) Are you spying?

    (3:21) A day in the life of Analyst Relations.

    (4:33) Analyst repost = Research?

    (5:01) The impact of Analyst Relations.

    (6:26) How are customers making decisions?

    (7:31) Can you predict the future?

    (9:44) Do criminals also look into the reports?

    (10:52) Analysts VS. Testers

    (12:33) Can the hardware be tested?

    (14:17) What are the biggest Cybersecurity trends?

    (15:08) What’s the “Zero trust”?

    (16:52) Is Cloud security genuinely secure?

    (18:04) Dying trend.

    (18:57) We don’t use Antivirus anymore.

    (22:44) Future risks.

    (23:59) TOP 3 things to stay safe online.

    (24:53) Should we be scared of Google?

    (25:24) Outro.

    Zuzana Legathova:
    LinkedIn

    Connect With Us:

    ⁠⁠X⁠⁠ | ⁠⁠Instagram⁠⁠ | ⁠⁠TikTok⁠⁠ | ⁠⁠Facebook⁠⁠ | ⁠⁠LinkedIn⁠⁠ | ⁠⁠Youtube⁠⁠

    ⁠⁠Our Main Site⁠⁠ | ⁠⁠WeLiveSecurity⁠⁠ | ⁠⁠Corporate Blog

  • Saknas det avsnitt?

    Klicka här för att uppdatera flödet manuellt.

  • Did you know a ducky can control your phone?Welcome to Episode #5 of Unlocked 403, where we dive deep into Android security threats with Lukas Stefanko, a leading malware researcher at ESET.

    In this episode, we explore some of the most intriguing and dangerous Android threats Lukas has encountered in his career, and he also shares crucial tips on how to stay safe online and protect your personal information.

    Watch the full episode on our Youtube channel as we perform 3 live demonstrations revealing how easy it is to take control of your device. This is a must-watch!Topics:(00:00) Intro(01:05) Let’s talk about Malware(02:30) Does it get easier to discover harmful code?(03:30) What sparked your interest in Android threats?(04:35) What are the most common types?(05:15) Do people still get tricked by Phishing?(05:59) How could malicious apps get into your phone?(07:32) How to recognize compromised applications?(08:28) Andriod vs. iOS - which is better(10:55) Security of the app stores(13:30) It’s not just antivirus anymore(14:10) What’s the most interesting Android threat you´ve ever seen?(16:05) Attacking devices(16:46) Demo 1: Exploiting physical security with Flipper Zero(18:42) Demo 2: Exploiting Wi-Fi security with M5StickC(22:00) Demo 3: Bluetooth vulnerability in unpatched Android device(25:14) How are we protecting people from these types of attacks?(26:22) App Defense Alliance(27:16) TOP 3 things to stay safe online(28:39) Outro

    Follow Lukas Stefanko:

    X | LinkedIn

    linkt.ree/mobilehacker

    Connect With Us:

    X | Instagram | TikTok | Facebook | LinkedIn | Youtube

    Our Main Site | WeLiveSecurity | Corporate Blog

  • What if a movie became a reality? And what if the traffic lights were suddenly switched on all at the same time?

    On this latest episode of Unlocked 403, ESET cybersecurity podcast, our host Becks spoke to Righard Zwienenberg, Senior Research Fellow. They covered the world of IoTs, the differences between personal and industrial IoTs, and how one might go about protecting them.

    Listen to this latest episode and find out more.


    Folow Righard Zwienenberg:

    LinkedIn

    Connect With Us:

    ⁠X⁠ | ⁠Instagram⁠ | ⁠TikTok⁠ | ⁠Facebook⁠ | ⁠LinkedIn⁠ | ⁠Youtube⁠

    ⁠Our Main Site⁠ | ⁠WeLiveSecurity⁠ | ⁠Corporate Blog

  • When science and art collide, they fuse and create Starmus!🚀

    Join us at Starmus Earth and witness the magic unfold before your eyes.

    Catch the latest episode of Unlocked 403 Podcast, where Becks delves into the world of Starmus with Dr. Garik Israelian, the mastermind behind the festival. 🎙️

    Get ready for an intriguing discussion about the importance of science and its communication, touched on the speed of cyber threats and even discovered who was a rebel in school.

    Don't miss out!

    Connect With Us:

    ⁠⁠X⁠⁠ | ⁠⁠Instagram⁠⁠ | ⁠⁠TikTok⁠⁠ | ⁠⁠Facebook⁠⁠ | ⁠⁠LinkedIn⁠⁠ | ⁠⁠Youtube⁠⁠

    ⁠⁠Our Main Site⁠⁠ | ⁠⁠WeLiveSecurity⁠⁠ | ⁠⁠Corporate Blog

  • Did you know cybercriminals can turn off electricity in an entire town just by a click of a button?

    In this episode of Unlocked 403, Becks is joined by Robert Lipovsky, Principal Threat Intelligence researcher at ESET, to discuss Threat Intelligence, what a malware researcher does, and how to become one.

    Watch the full episode on our Youtube channel to find out what a frustrated cybercriminal puts in their code.

    Connect With Us:

    ⁠⁠X⁠⁠ | ⁠⁠Instagram⁠⁠ | ⁠⁠TikTok⁠⁠ | ⁠⁠Facebook⁠⁠ | ⁠⁠LinkedIn⁠⁠ | ⁠⁠Youtube⁠⁠

    ⁠⁠Our Main Site⁠⁠ | ⁠⁠WeLiveSecurity⁠⁠ | ⁠⁠Corporate Blog

  • Join us on an extraordinary journey into the world of AI with Security Awareness Specialist, Ondrej Kubovic!

    This episode of our new podcast, Unlocked 403, is set to ignite your curiosity and unravel the mysteries of artificial intelligence. 🚀🔍

    Don't miss it and stay tuned to learn more!

    Chapters:(00:00) Introduction

    (00:55) What is AI?

    (02:12) Does AI understand when you're nice to it?

    (05:03) Is it actual AI?

    (07:03) How ethical is this technology?

    (10:13) Can AI make decisions?

    (12:29) AI can be poisoned

    (13:27) Can you believe what you see online?

    (14:32) Earthquake that never happened

    (16:18) How to navigate online through the fakes

    (19:42) AI-generated influencers

    (21:31) Сan AI affect the general elections?

    (24:47) Building of an AI-checker

    (28:22) Sextortion

    (32:00) How do you prevent your images from being stolen?

    (35:35) Voice cloning

    (36:53) How is AI changing the cybercriminal landscape?

    (39:14) AI makes mistakes to sound more human

    (41:28) How do you fight against AI-based threats?

    (43:13) What's good about AI?

    (45:53) Conclusion

    #403Unlocked #CybersecurityPodcast #TechTalks