Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Manage episode 489610434 series 3009097
Content provided by Many Worlds Productions. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Many Worlds Productions or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
In this episode of How Hacks Happen, we delve into the complexities surrounding trash possession and legalities. Besides the legal distinctions between lost, mislaid, and abandoned property, there are the risks posed by scammers who rifle through trash for personal information so they can steal your identity or call you up and pretend to be your bank. No trash is safe in this world we live in, so shred, burn, and sanitize your trash before throwing it out.
Resources:
- Dumpster Diving for Documents: The Low-Tech Threat Fueling High-Stakes Identity Theft
- California v. Greenwood
- State v. Hempele
Join our Patreon to listen ad-free!
Chapters
1. Who owns your trash? It's probably not you. (00:00:00)
2. [Ad] Digital Disruption with Geoff Nielson (00:12:45)
3. (Cont.) Who owns your trash? It's probably not you. (00:13:27)
72 episodes