Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Fiction
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/95/1c/31/951c313c-4cb2-612c-2e56-77ea1014ce63/mza_8760588504320426370.jpg/600x600bb.jpg
Unlocked 403 | Cybersecurity Podcast
ESET
16 episodes
20 hours ago
Cybersecurity Podcast - We want to bring cybersecurity to your ears, educate as well entertain you all at once. No worries, if you are new to the topic of digital security, we´ve got you covered. If you feel at home in cyberspace, we invite you to listen to experts from ESET, talk about their fascinating jobs as well as the latest threats and trends.
Show more...
Technology
RSS
All content for Unlocked 403 | Cybersecurity Podcast is the property of ESET and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cybersecurity Podcast - We want to bring cybersecurity to your ears, educate as well entertain you all at once. No worries, if you are new to the topic of digital security, we´ve got you covered. If you feel at home in cyberspace, we invite you to listen to experts from ESET, talk about their fascinating jobs as well as the latest threats and trends.
Show more...
Technology
Episodes (16/16)
Unlocked 403 | Cybersecurity Podcast
How Social Engineering Really Works

Why do people fall for online scams even when they know the risks? In this episode of Unlocked 403, Becks is joined by Alena Košinárová, software engineer at ESET, to explore how attackers use psychological manipulation to trick their targets.

They break down the most common tactics behind phishing, romance scams, sextortion, and impersonation. Alena explains why humans are still the easiest entry point for cybercriminals and how public data is often used to craft convincing attacks.

In a surprising twist, Alena puts her skills to the test by social engineering Becks herself.

Don't forget to like, comment, and subscribe for more insights into cybersecurity and tech!


Topics:

(00:00) – Intro

(00:47) – Meet Alena Košinárová

(01:13) – Career Journey

(03:12) – What Is Social Engineering?

(05:36) – Offline vs. Online Attacks

(09:06) – Common Social Engineering Tactics

(11:03) – Romance Scams

(12:43) – Sextortion

(15:54) – Deepfakes & Blackmail

(17:46) – Can Security Tools Help?

(19:35) – How Hackers Gather Info

(20:24) – Social Engineering Demo

(32:31) – Red Flags to Watch

(35:02) – Top 5 Safety Tips

(37:19) – Outro


Connect With Us:

Our Main Site: https://www.eset.com/int/

X: https://twitter.com/ESET

Instagram https://www.instagram.com/eset/

Facebook https://www.facebook.com/eset

LinkedIn https://www.linkedin.com/company/eset/

TikTok https://www.tiktok.com/@eset_global

WeLiveSecurity blog https://www.welivesecurity.com/

Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/

YouTube: https://www.youtube.com/c/esetglobal

Show more...
4 weeks ago
38 minutes 9 seconds

Unlocked 403 | Cybersecurity Podcast
Is Your Phone Spying on You?

In this episode of Unlocked 403, Becks is joined by Lukas Stefanko, leading malware researcher at ESET, to unpack the evolution of espionage in the digital age — and how our smartphones became a new battleground.


They explore the shift from Cold War tactics to today’s silent threats, like spyware tools embedded in seemingly harmless apps. From the basics of what spyware is and how it operates, to real-world examples like BadBazaar and the infamous Pegasus, this conversation dives deep into how threat actors can turn phones into surveillance devices.


Don’t forget to comment and subscribe!


Topics:

(00:00) – Intro

(00:56) – Meet Lukas Stefanko

(01:36) – Espionage: Then & Now

(02:58) – Today’s Cyber Espionage Tools

(03:57) – What Is Spyware?

(05:58) – How Spyware Infects Devices

(08:48) – Are Smartphones More Vulnerable?

(12:37) – The BadBazaar Espionage Tool

(17:34) – How Long Does Spyware Stay Active?

(21:28) – Pegasus: Mobile Surveillance at Scale

(24:36) – Government Use of Pegasus

(26:30) – Can Spyware Tools Be Regulated?

(27:18) – Removing Spyware from Your Device

(30:10) – What About Military-Grade Spyware?

(31:17) – Top 3 Tips to Stay Safe Online

(32:45) – Outro


Connect With Us:

Our Main Site: https://www.eset.com/int/

X: https://twitter.com/ESET

Instagram https://www.instagram.com/eset/

Facebook https://www.facebook.com/eset

LinkedIn https://www.linkedin.com/company/eset/

TikTok https://www.tiktok.com/@eset_global

WeLiveSecurity blog https://www.welivesecurity.com/

Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/

YouTube: https://www.youtube.com/c/esetglobal

Show more...
3 months ago
33 minutes 56 seconds

Unlocked 403 | Cybersecurity Podcast
Why Is Your Data Worth So Much?

In this episode of Unlocked 403, Becks talks with Jake Moore, Global Security Advisor at ESET, about what it really means when we say “you are the product.”


They explore how social media platforms collect and use our data, what risks that poses—especially for kids—and how users can take back some of the control.


From data minimization to metadata, the right to be forgotten, and tips for staying safe online, this episode is packed with practical advice and insights.


Don’t forget to like, comment, and subscribe!


Topics:

(00:00) - Intro

(01:15) - Jake Moore returns

(03:32) - If it's free, are you the product?

(04:51) - Personally identifiable information

(08:12) - Are you sharing too much online?

(09:13) - Think twice before you post

(12:04) - Fist-party vs. Third party data collection

(14:43) - Data minimization

(16:07) - Privacy settings to the rescue?

(17:31) - Double-check Terms & Conditions

(18:52) - What is metadata?

(19:55) - Handling of metadata online

(22:05) - Has data collection changed society?

(24:18) - Ethics of data collection

(26:48) - TOP 3 tips to stay safe online

(28:23) - Outro


Connect With Us:

Our Main Site: https://www.eset.com/int/

X: https://twitter.com/ESET

Instagram https://www.instagram.com/eset/

Facebook https://www.facebook.com/eset

LinkedIn https://www.linkedin.com/company/eset/

TikTok https://www.tiktok.com/@eset_global

WeLiveSecurity blog https://www.welivesecurity.com/

Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/

YouTube: https://www.youtube.com/c/esetglobal

Show more...
4 months ago
29 minutes 17 seconds

Unlocked 403 | Cybersecurity Podcast
How to get into Cybersecurity

In this episode of Unlocked 403, cybersecurity podcast by ESET, Becks sits down with Robert Lipovský, Principal Threat Intelligence Researcher at ESET, to talk all things cyber!


They dive into how they got started in cybersecurity, what it really takes to thrive in the field, and why a university diploma isn’t your only golden ticket. Whether you’re eyeing a technical path or a non-technical role, this conversation breaks down the skills, mindset, and passion needed to make it in this ever-evolving industry.


Curious about a career in cyber? This one's for you.


Don’t forget to comment, and subscribe for more from cybersecurity and tech!


Topics:

(00:00) - Intro

(01:15) - Principal threat intelligence researcher

(01:52) - How did Robert get into cybersecurity?

(03:27) - QUIZ!

(05:57) - A typical day in cybersecurity

(07:58) - Research cycle

(10:08) - Myths about cybersecurity

(11:37) - How to start a cybersecurity career?

(13:17) - Job diversity in cybersecurity

(15:41) - What are the requirements?

(17:01) - How much experience do you need to have?

(19:19) - I hired a 17-year-old without a diploma

(20:10) - Most in-demand skills in cybersecurity

(21:40) - Cybersecurity communication

(23:18) - Future of cybersecurity

(24:21) - TOP 3 advice for a cybersecurity career

(27:01) - Outro


Connect With Us:

Our Main Site: https://www.eset.com/int/

X: https://twitter.com/ESET

Instagram https://www.instagram.com/eset/

Facebook https://www.facebook.com/eset

LinkedIn https://www.linkedin.com/company/eset/

TikTok https://www.tiktok.com/@eset_global

WeLiveSecurity blog https://www.welivesecurity.com/

Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/

YouTube: https://www.youtube.com/c/esetglobal

Show more...
5 months ago
28 minutes 9 seconds

Unlocked 403 | Cybersecurity Podcast
Can We Counter Online Disinformation?

Why are we so quick to believe and share false information online?

In this episode of Unlocked 403, Becks talks with the lead researcher from KInIT, Jakub Šimko, to explore how social media’s design and human psychology work together to fuel the spread of false information.

Follow  @kinit_institute  KInIT website

Don’t forget to like, comment, and subscribe for more from cybersecurity and tech!


Topics:

(00:00) - Intro

(00:53) - Discover KInIT

(02:01) - Misinformation vs. Disinformation

(03:27) - The spread of false information

(05:07) - Which topics gain the most traction?

(06:31) - Evolution of disinformation tactics

(07:50) - Is attention span at fault?

(08:40) - How is false information created?

(12:15) - Deepfake Quizz - Image sample

(13:32) - Deepfake Quizz - Image sample

(14:14) - Deepfake Quizz - Video sample

(15:43) - Deepfake Quizz - Audio sample

(18:05) - Deepfake Quizz - Results

(18:43) - Why are we susceptible to misinformation?

(21:05) - Seeing things from both perspectives

(22:42) - AI to counter disinformation?

(24:39) - Censorship

(25:57) - Free speech vs. Content moderation

(27:28) - Jakub Šimko's advice

(28:33) - Outro


Connect With Us:

⁠⁠⁠⁠⁠X⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠Instagram⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠TikTok⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠Facebook⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠LinkedIn⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠Youtube⁠⁠⁠⁠⁠

⁠⁠⁠⁠⁠Our Main Site⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠WeLiveSecurity⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠Corporate Blog

Show more...
6 months ago
29 minutes 16 seconds

Unlocked 403 | Cybersecurity Podcast
AI's Biggest Surprises and Trends

Welcome to Season 2 of Unlocked 403! Kicking off the new season, Becks sits down with cybersecurity expert Ondrej Kubovič to break down the biggest AI developments of the past year—the good, the bad, and the downright unexpected.

From AI’s role in modern warfare to its impact on everyday life, we explore how artificial intelligence is reshaping the world around us. What were the most surprising AI breakthroughs? How is it influencing cybersecurity? And what does the future hold? Tune in to find out!

Don’t forget to like, comment, and subscribe for more from cybersecurity and tech!


Check out ESET Research Podcast


Topics:

(00:00) - Intro

(00:50) - Ondrej is back!

(01:52) - What´s new with AI?

(03:02) - Agentic AI

(05:14) - Still MLM’s

(06:16) - Most surprising use of AI

(09:34) - AI in modern war

(11:32) - How AI is changing warfare?

(13:20) - Could AI decide to destroy humanity?

(14:25) - AI in healthcare

(16:10) - AI in cybersecurity

(17:37) - How cybercriminals are using AI?

(20:05) - Follow-up scams

(21:34) - How to fight AI scams?

(23:04) - Nobody is prepared

(24:40) - AI trends in 2025

(27:14) - AI-generated content

(29:00) - AI in CyberSec predictions in 2025

(30:00) - What people get wrong about AI?

(31:55) - Outro 


Connect With Us:

⁠⁠⁠⁠X⁠⁠⁠⁠ | ⁠⁠⁠⁠Instagram⁠⁠⁠⁠ | ⁠⁠⁠⁠TikTok⁠⁠⁠⁠ | ⁠⁠⁠⁠Facebook⁠⁠⁠⁠ | ⁠⁠⁠⁠LinkedIn⁠⁠⁠⁠ | ⁠⁠⁠⁠Youtube⁠⁠⁠⁠

⁠⁠⁠⁠Our Main Site⁠⁠⁠⁠ | ⁠⁠⁠⁠WeLiveSecurity⁠⁠⁠⁠ | ⁠⁠⁠⁠Corporate Blog

Show more...
8 months ago
33 minutes 43 seconds

Unlocked 403 | Cybersecurity Podcast
What is Penetration Testing?

In this episode of Unlocked 403, cybersecurity podcast, Becks dives into the fascinating world of ethical hacking with two expert pentesters! Together, they explore the ins and outs of online and offline ethical hacking, breaking down how professionals identify vulnerabilities while staying on the right side of the law.

From social engineering tricks to internal testing strategies, you’ll get an inside look at how pentesters approach their craft, plus, how shockingly easy it is to disable a home alarm system – and how to protect yourself from these types of attacks.

For more info on ESET Services and how to contact us, click this link

Don’t forget to like, comment, and subscribe for more episodes of Unlocked 403.


Topics:

(00:00) - Intro

(00:53) - What is penetration testing?

(02:54) - Permission to hack

(04:15) - What does pentesting look like?

05:09 - Reversing the source code

(06:08) - Social engineering

(07:08) - Prank people for a living

(08:32) - Physical penetration testing

(08:53) - The easiest way to get into any building

(09:31) - Live demo of Replay attack

(15:34) - Which industries need pentesting most?

(17:40) - AI & Ethical hacking

(21:56) - How to get into pentesting?

(23:49) - Tips to stay safe online

(27:05) - Where can you learn more about pentesting?

(28:52) - Outro


Connect With Us:

⁠⁠⁠X⁠⁠⁠ | ⁠⁠⁠Instagram⁠⁠⁠ | ⁠⁠⁠TikTok⁠⁠⁠ | ⁠⁠⁠Facebook⁠⁠⁠ | ⁠⁠⁠LinkedIn⁠⁠⁠ | ⁠⁠⁠Youtube⁠⁠⁠

⁠⁠⁠Our Main Site⁠⁠⁠ | ⁠⁠⁠WeLiveSecurity⁠⁠⁠ | ⁠⁠⁠Corporate Blog

Show more...
9 months ago
29 minutes 42 seconds

Unlocked 403 | Cybersecurity Podcast
Unwrapping Christmas Scams

Holiday cheer is in the air, but so are the scammers! In this festive episode of Unlocked 403, a cybersecurity podcast brought to you by ESET, we dive into the sneaky world of online Christmas scams. Becks is joined by Jake Moore, Global Security Advisor at ESET, to expose the tactics scammers use to exploit the holiday season—from fake shopping deals to phishing emails.

Stick around until the end for a surprise appearance you won’t want to miss!

Don't let scams ruin your holiday spirit and make this season merry and secure!


Follow Jake Moore:

LinkedIn


Topics:

(00:00) - Intro.

(01:04) - Who is Jake Moore?

(01:40) - Why is the holiday season a prime time for scammers?

(03:23) - Has AI changed scamming tactics?

(05:06) - What generation is more vulnerable to scams?

(06:28) - Targeted attacks.

(08:22) - Why are people falling for scams?

(09:57) - Most common attacks.

(11:03) - How do scammers use social media?

(13:46) - “Secret sister” scam.

(15:11) - Has Jake ever been scammed?

(16:29) - Data privacy tests by Jake.

(19:05) - Do not engage with scammers.

(20:15) - AI-Granny.

(21:32) - Deepfakes.

(24:06) - Future of deepfake scams.

(28:31) - What to do if you’ve been scammed?

(29:24) - Physical crime vs. Cyber-crime investigation

(32:48) - TOP 3 tips to stay safe online.

(33:23) - Favorite Christmas movie.

(34:32) - PRESENTS!

(36:15) - Outro.


Connect With Us:

⁠⁠X⁠⁠ | ⁠⁠Instagram⁠⁠ | ⁠⁠TikTok⁠⁠ | ⁠⁠Facebook⁠⁠ | ⁠⁠LinkedIn⁠⁠ | ⁠⁠Youtube⁠⁠

⁠⁠Our Main Site⁠⁠ | ⁠⁠WeLiveSecurity⁠⁠ | ⁠⁠Corporate Blog


Show more...
11 months ago
37 minutes 23 seconds

Unlocked 403 | Cybersecurity Podcast
Is Your Business REALLY Cyber Secure?

In this episode of Unlocked 403, Becks dives deep into the ever-evolving world of B2B cybersecurity, discussing key strategies businesses need to adopt to protect their networks and data. From the infamous Blue Screen of Death (BSOD) to the intricacies of kernel access and Falcon sensors, this episode unpacks critical topics for IT professionals and decision-makers alike.


Joining Becks is Michal Jankech, VP of SMB, MSP, and Enterprise Segment at ESET, a global leader in cybersecurity solutions. Michal shares his expert insights on how companies of all sizes can fortify their defenses, adapt to emerging threats, and leverage cutting-edge technologies to stay ahead of the curve.


Follow Michal Jankech:

LinkedIn


Topics:

(00:00) - Intro (00:53) - How did you get into cybersecurity? (03:10) - Difference between B2C & B2B in cybersecurity (04:45) - Biggest cybersecurity challenges for businesses (07:14) - Human factor (09:40) - Awareness VS Solution (11:45) - Crowdstrike incident (13:51) - Was it a security incident? (15:15) - Crowdstrike and Microsoft (18:06) - Consequences of the Kernel access limitations (19:33) - Is built-in security enough? (21:44) - Business-security tips (24:47) - Train your users! (25:14) - What about prevention? (27:08) - Useful resources to stay updated (29:04) - TOP 3 tips to stay safe online (30:45) - Outro


Connect With Us:

⁠X⁠ | ⁠Instagram⁠ | ⁠TikTok⁠ | ⁠Facebook⁠ | ⁠LinkedIn⁠ | ⁠Youtube⁠

⁠Our Main Site⁠ | ⁠WeLiveSecurity⁠ | ⁠Corporate Blog

Show more...
11 months ago
32 minutes 10 seconds

Unlocked 403 | Cybersecurity Podcast
How to keep children safe online?

Hey, wanna chat?

A seemingly innocent message between adults, but between an adult and a child it can lead to grooming.

In this episode of Unlocked 403, a cybersecurity podcast brought to you by ESET, Becks sat down with Kamila Ryšánková, a child psychologist, to discuss what grooming is and why some kids may be more susceptible to falling prey.

Watch the episode and find out what you can do to keep your child safe online.

For more resources on grooming visit: saferkidsonline.eset.com


Topics:

(00:00) Intro

(01:16) What is grooming?

(02:06) Online VS offline grooming

(03:02) Who is targeted more: boys or girls?

(03:46) Groomer = Pedophile?

(04:31) Are some kids more susceptible?

(5:27) Isolating the child

(06:21) How do groomers prepare?

(07:51) Child's response to cybergrooming

(08:44) Why don’t kids share with their parents?

(10:18) Effects on the child

(12:45) Underreported crime

(13:09) Why parents don't report it?

(14:36) What should a child do?

(15:41) Preventing cybergrooming

(16:25) Internet = city

(17:02) Talking to kids about grooming

(17:51) Grandma rule

(18:38) Identifying groomers’ messages

(19:55) Red flags

(21:05) Top 3 advice for parents

(22:46) Parental control

(23:52) Outro


Connect With Us:

⁠⁠⁠X⁠⁠⁠ | ⁠⁠⁠Instagram⁠⁠⁠ | ⁠⁠⁠TikTok⁠⁠⁠ | ⁠⁠⁠Facebook⁠⁠⁠ | ⁠⁠⁠LinkedIn⁠⁠⁠ | ⁠⁠⁠Youtube⁠⁠⁠

⁠⁠⁠Our Main Site⁠⁠⁠ | ⁠⁠⁠WeLiveSecurity⁠⁠⁠ | ⁠⁠⁠Corporate Blog

Show more...
1 year ago
24 minutes 56 seconds

Unlocked 403 | Cybersecurity Podcast
Influencing the influencers

Join us for the 6th episode of ESET's Unlocked 403 podcast. This time, Becks spoke to Zuzana Legathova, Senior Manager of Analyst and Tester Relations, at ESET, explore future trends in cybersecurity and those on their way out. A must-listen for anyone interested in the evolving cybersecurity landscape.


Topics:

(00:00) Intro. 

(1:00) What’s the Analyst Relations manager job? 

(1:44) Are you spying?  

(3:21) A day in the life of Analyst Relations.

(4:33) Analyst repost = Research?

(5:01) The impact of Analyst Relations.    

(6:26) How are customers making decisions? 

(7:31) Can you predict the future? 

(9:44) Do criminals also look into the reports? 

(10:52) Analysts VS. Testers

(12:33) Can the hardware be tested? 

(14:17) What are the biggest Cybersecurity trends? 

(15:08) What’s the “Zero trust”? 

(16:52) Is Cloud security genuinely secure? 

(18:04) Dying trend.

(18:57) We don’t use Antivirus anymore.

(22:44) Future risks.

(23:59) TOP 3 things to stay safe online.  

(24:53) Should we be scared of Google?  

(25:24) Outro. 


Zuzana Legathova:
LinkedIn


Connect With Us:

⁠⁠X⁠⁠ | ⁠⁠Instagram⁠⁠ | ⁠⁠TikTok⁠⁠ | ⁠⁠Facebook⁠⁠ | ⁠⁠LinkedIn⁠⁠ | ⁠⁠Youtube⁠⁠

⁠⁠Our Main Site⁠⁠ | ⁠⁠WeLiveSecurity⁠⁠ | ⁠⁠Corporate Blog

Show more...
1 year ago
26 minutes 28 seconds

Unlocked 403 | Cybersecurity Podcast
Exploring Android Threats

Did you know a ducky can control your phone? Welcome to Episode #5 of Unlocked 403, where we dive deep into Android security threats with Lukas Stefanko, a leading malware researcher at ESET.

In this episode, we explore some of the most intriguing and dangerous Android threats Lukas has encountered in his career, and he also shares crucial tips on how to stay safe online and protect your personal information.

Watch the full episode on our Youtube channel as we perform 3 live demonstrations revealing how easy it is to take control of your device. This is a must-watch! Topics: (00:00) Intro (01:05) Let’s talk about Malware (02:30) Does it get easier to discover harmful code? (03:30) What sparked your interest in Android threats? (04:35) What are the most common types? (05:15) Do people still get tricked by Phishing? (05:59) How could malicious apps get into your phone? (07:32) How to recognize compromised applications? (08:28) Andriod vs. iOS - which is better (10:55) Security of the app stores (13:30) It’s not just antivirus anymore (14:10) What’s the most interesting Android threat you´ve ever seen? (16:05) Attacking devices (16:46) Demo 1: Exploiting physical security with Flipper Zero (18:42) Demo 2: Exploiting Wi-Fi security with M5StickC (22:00) Demo 3: Bluetooth vulnerability in unpatched Android device (25:14) How are we protecting people from these types of attacks? (26:22) App Defense Alliance (27:16) TOP 3 things to stay safe online (28:39) Outro


Follow Lukas Stefanko:

X | LinkedIn

linkt.ree/mobilehacker


Connect With Us:

X | Instagram | TikTok | Facebook | LinkedIn | Youtube

Our Main Site | WeLiveSecurity | Corporate Blog

Show more...
1 year ago
30 minutes 17 seconds

Unlocked 403 | Cybersecurity Podcast
How to navigate IoT Risks?

What if a movie became a reality? And what if the traffic lights were suddenly switched on all at the same time?

On this latest episode of Unlocked 403, ESET cybersecurity podcast, our host Becks spoke to Righard Zwienenberg, Senior Research Fellow. They covered the world of IoTs, the differences between personal and industrial IoTs, and how one might go about protecting them.

Listen to this latest episode and find out more.


Folow Righard Zwienenberg:

LinkedIn


Connect With Us:

⁠X⁠ | ⁠Instagram⁠ | ⁠TikTok⁠ | ⁠Facebook⁠ | ⁠LinkedIn⁠ | ⁠Youtube⁠

⁠Our Main Site⁠ | ⁠WeLiveSecurity⁠ | ⁠Corporate Blog

Show more...
1 year ago
28 minutes 25 seconds

Unlocked 403 | Cybersecurity Podcast
How to inspire future scientists?

When science and art collide, they fuse and create Starmus!🚀

Join us at Starmus Earth and witness the magic unfold before your eyes.

Catch the latest episode of Unlocked 403 Podcast, where Becks delves into the world of Starmus with Dr. Garik Israelian, the mastermind behind the festival. 🎙️

Get ready for an intriguing discussion about the importance of science and its communication, touched on the speed of cyber threats and even discovered who was a rebel in school.

Don't miss out!


Connect With Us:

⁠⁠X⁠⁠ | ⁠⁠Instagram⁠⁠ | ⁠⁠TikTok⁠⁠ | ⁠⁠Facebook⁠⁠ | ⁠⁠LinkedIn⁠⁠ | ⁠⁠Youtube⁠⁠

⁠⁠Our Main Site⁠⁠ | ⁠⁠WeLiveSecurity⁠⁠ | ⁠⁠Corporate Blog

Show more...
1 year ago
26 minutes 30 seconds

Unlocked 403 | Cybersecurity Podcast
Threat Intelligence in Hybrid War

Did you know cybercriminals can turn off electricity in an entire town just by a click of a button?

In this episode of Unlocked 403, Becks is joined by Robert Lipovsky, Principal Threat Intelligence researcher at ESET, to discuss Threat Intelligence, what a malware researcher does, and how to become one.

Watch the full episode on our Youtube channel to find out what a frustrated cybercriminal puts in their code.

Connect With Us:

⁠⁠X⁠⁠ | ⁠⁠Instagram⁠⁠ | ⁠⁠TikTok⁠⁠ | ⁠⁠Facebook⁠⁠ | ⁠⁠LinkedIn⁠⁠ | ⁠⁠Youtube⁠⁠

⁠⁠Our Main Site⁠⁠ | ⁠⁠WeLiveSecurity⁠⁠ | ⁠⁠Corporate Blog

Show more...
1 year ago
29 minutes 19 seconds

Unlocked 403 | Cybersecurity Podcast
What is AI?

Join us on an extraordinary journey into the world of AI with Security Awareness Specialist, Ondrej Kubovic!

This episode of our new podcast, Unlocked 403, is set to ignite your curiosity and unravel the mysteries of artificial intelligence. 🚀🔍

Don't miss it and stay tuned to learn more!


Chapters:(00:00) Introduction

(00:55) What is AI?

(02:12) Does AI understand when you're nice to it?

(05:03) Is it actual AI?

(07:03) How ethical is this technology?

(10:13) Can AI make decisions?

(12:29) AI can be poisoned

(13:27) Can you believe what you see online?

(14:32) Earthquake that never happened

(16:18) How to navigate online through the fakes

(19:42) AI-generated influencers

(21:31) Сan AI affect the general elections?

(24:47) Building of an AI-checker

(28:22) Sextortion

(32:00) How do you prevent your images from being stolen?

(35:35) Voice cloning

(36:53) How is AI changing the cybercriminal landscape?

(39:14) AI makes mistakes to sound more human

(41:28) How do you fight against AI-based threats?

(43:13) What's good about AI?

(45:53) Conclusion


#403Unlocked #CybersecurityPodcast #TechTalks

Show more...
1 year ago
46 minutes 34 seconds

Unlocked 403 | Cybersecurity Podcast
Cybersecurity Podcast - We want to bring cybersecurity to your ears, educate as well entertain you all at once. No worries, if you are new to the topic of digital security, we´ve got you covered. If you feel at home in cyberspace, we invite you to listen to experts from ESET, talk about their fascinating jobs as well as the latest threats and trends.