Unlocked 403 | Cybersecurity Podcast

ESET

Cybersecurity Podcast - We want to bring cybersecurity to your ears, educate as well entertain you all at once. No worries, if you are new to the topic of digital security, we´ve got you covered. If you feel at home in cyberspace, we invite you to listen to experts from ESET, talk about their fascinating jobs as well as the latest threats and trends.

  1. 10/15/2025

    How Social Engineering Really Works

    Why do people fall for online scams even when they know the risks? In this episode of Unlocked 403, Becks is joined by Alena Košinárová, software engineer at ESET, to explore how attackers use psychological manipulation to trick their targets. They break down the most common tactics behind phishing, romance scams, sextortion, and impersonation. Alena explains why humans are still the easiest entry point for cybercriminals and how public data is often used to craft convincing attacks. In a surprising twist, Alena puts her skills to the test by social engineering Becks herself. Don't forget to like, comment, and subscribe for more insights into cybersecurity and tech! Topics: (00:00) – Intro (00:47) – Meet Alena Košinárová (01:13) – Career Journey (03:12) – What Is Social Engineering? (05:36) – Offline vs. Online Attacks (09:06) – Common Social Engineering Tactics (11:03) – Romance Scams (12:43) – Sextortion (15:54) – Deepfakes & Blackmail (17:46) – Can Security Tools Help? (19:35) – How Hackers Gather Info (20:24) – Social Engineering Demo (32:31) – Red Flags to Watch (35:02) – Top 5 Safety Tips (37:19) – Outro Connect With Us: Our Main Site: https://www.eset.com/int/ X: https://twitter.com/ESET Instagram https://www.instagram.com/eset/ Facebook https://www.facebook.com/eset LinkedIn https://www.linkedin.com/company/eset/ TikTok https://www.tiktok.com/@eset_global WeLiveSecurity blog https://www.welivesecurity.com/ Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/ YouTube: https://www.youtube.com/c/esetglobal

    38 min
  2. 07/31/2025

    Is Your Phone Spying on You?

    In this episode of Unlocked 403, Becks is joined by Lukas Stefanko, leading malware researcher at ESET, to unpack the evolution of espionage in the digital age — and how our smartphones became a new battleground. They explore the shift from Cold War tactics to today’s silent threats, like spyware tools embedded in seemingly harmless apps. From the basics of what spyware is and how it operates, to real-world examples like BadBazaar and the infamous Pegasus, this conversation dives deep into how threat actors can turn phones into surveillance devices. Don’t forget to comment and subscribe! Topics: (00:00) – Intro (00:56) – Meet Lukas Stefanko (01:36) – Espionage: Then & Now (02:58) – Today’s Cyber Espionage Tools (03:57) – What Is Spyware? (05:58) – How Spyware Infects Devices (08:48) – Are Smartphones More Vulnerable? (12:37) – The BadBazaar Espionage Tool (17:34) – How Long Does Spyware Stay Active? (21:28) – Pegasus: Mobile Surveillance at Scale (24:36) – Government Use of Pegasus (26:30) – Can Spyware Tools Be Regulated? (27:18) – Removing Spyware from Your Device (30:10) – What About Military-Grade Spyware? (31:17) – Top 3 Tips to Stay Safe Online (32:45) – Outro Connect With Us: Our Main Site: https://www.eset.com/int/ X: https://twitter.com/ESET Instagram https://www.instagram.com/eset/ Facebook https://www.facebook.com/eset LinkedIn https://www.linkedin.com/company/eset/ TikTok https://www.tiktok.com/@eset_global WeLiveSecurity blog https://www.welivesecurity.com/ Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/ YouTube: https://www.youtube.com/c/esetglobal

    34 min
  3. 06/30/2025

    Why Is Your Data Worth So Much?

    In this episode of Unlocked 403, Becks talks with Jake Moore, Global Security Advisor at ESET, about what it really means when we say “you are the product.” They explore how social media platforms collect and use our data, what risks that poses—especially for kids—and how users can take back some of the control. From data minimization to metadata, the right to be forgotten, and tips for staying safe online, this episode is packed with practical advice and insights. Don’t forget to like, comment, and subscribe! Topics: (00:00) - Intro (01:15) - Jake Moore returns (03:32) - If it's free, are you the product? (04:51) - Personally identifiable information (08:12) - Are you sharing too much online? (09:13) - Think twice before you post (12:04) - Fist-party vs. Third party data collection (14:43) - Data minimization (16:07) - Privacy settings to the rescue? (17:31) - Double-check Terms & Conditions (18:52) - What is metadata? (19:55) - Handling of metadata online (22:05) - Has data collection changed society? (24:18) - Ethics of data collection (26:48) - TOP 3 tips to stay safe online (28:23) - Outro Connect With Us: Our Main Site: https://www.eset.com/int/ X: https://twitter.com/ESET Instagram https://www.instagram.com/eset/ Facebook https://www.facebook.com/eset LinkedIn https://www.linkedin.com/company/eset/ TikTok https://www.tiktok.com/@eset_global WeLiveSecurity blog https://www.welivesecurity.com/ Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/ YouTube: https://www.youtube.com/c/esetglobal

    29 min
  4. 06/03/2025

    How to get into Cybersecurity

    In this episode of Unlocked 403, cybersecurity podcast by ESET, Becks sits down with Robert Lipovský, Principal Threat Intelligence Researcher at ESET, to talk all things cyber! They dive into how they got started in cybersecurity, what it really takes to thrive in the field, and why a university diploma isn’t your only golden ticket. Whether you’re eyeing a technical path or a non-technical role, this conversation breaks down the skills, mindset, and passion needed to make it in this ever-evolving industry. Curious about a career in cyber? This one's for you. Don’t forget to comment, and subscribe for more from cybersecurity and tech! Topics: (00:00) - Intro (01:15) - Principal threat intelligence researcher (01:52) - How did Robert get into cybersecurity? (03:27) - QUIZ! (05:57) - A typical day in cybersecurity (07:58) - Research cycle (10:08) - Myths about cybersecurity (11:37) - How to start a cybersecurity career? (13:17) - Job diversity in cybersecurity (15:41) - What are the requirements? (17:01) - How much experience do you need to have? (19:19) - I hired a 17-year-old without a diploma (20:10) - Most in-demand skills in cybersecurity (21:40) - Cybersecurity communication (23:18) - Future of cybersecurity (24:21) - TOP 3 advice for a cybersecurity career (27:01) - Outro Connect With Us: Our Main Site: https://www.eset.com/int/ X: https://twitter.com/ESET Instagram https://www.instagram.com/eset/ Facebook https://www.facebook.com/eset LinkedIn https://www.linkedin.com/company/eset/ TikTok https://www.tiktok.com/@eset_global WeLiveSecurity blog https://www.welivesecurity.com/ Corporate Blog https://www.eset.com/us/about/newsroom/corporate-blog-list/ YouTube: https://www.youtube.com/c/esetglobal

    28 min
  5. 04/30/2025

    Can We Counter Online Disinformation?

    Why are we so quick to believe and share false information online? In this episode of Unlocked 403, Becks talks with the lead researcher from KInIT, Jakub Šimko, to explore how social media’s design and human psychology work together to fuel the spread of false information. Follow  @kinit_institute  KInIT website Don’t forget to like, comment, and subscribe for more from cybersecurity and tech! Topics: (00:00) - Intro (00:53) - Discover KInIT (02:01) - Misinformation vs. Disinformation (03:27) - The spread of false information (05:07) - Which topics gain the most traction? (06:31) - Evolution of disinformation tactics (07:50) - Is attention span at fault? (08:40) - How is false information created? (12:15) - Deepfake Quiz - Image sample (13:32) - Deepfake Quiz - Image sample (14:14) - Deepfake Quiz - Video sample (15:43) - Deepfake Quiz - Audio sample (18:05) - Deepfake Quiz - Results (18:43) - Why are we susceptible to misinformation? (21:05) - Seeing things from both perspectives (22:42) - AI to counter disinformation? (24:39) - Censorship (25:57) - Free speech vs. Content moderation (27:28) - Jakub Šimko's advice (28:33) - Outro Connect With Us: ⁠⁠⁠⁠⁠X⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠Instagram⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠TikTok⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠Facebook⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠LinkedIn⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠Youtube⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠Our Main Site⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠WeLiveSecurity⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠Corporate Blog

    29 min
  6. 02/28/2025

    AI's Biggest Surprises and Trends

    Welcome to Season 2 of Unlocked 403! Kicking off the new season, Becks sits down with cybersecurity expert Ondrej Kubovič to break down the biggest AI developments of the past year—the good, the bad, and the downright unexpected. From AI’s role in modern warfare to its impact on everyday life, we explore how artificial intelligence is reshaping the world around us. What were the most surprising AI breakthroughs? How is it influencing cybersecurity? And what does the future hold? Tune in to find out! Don’t forget to like, comment, and subscribe for more from cybersecurity and tech! Check out ESET Research Podcast Topics: (00:00) - Intro (00:50) - Ondrej is back! (01:52) - What´s new with AI? (03:02) - Agentic AI (05:14) - Still MLM’s (06:16) - Most surprising use of AI (09:34) - AI in modern war (11:32) - How AI is changing warfare? (13:20) - Could AI decide to destroy humanity? (14:25) - AI in healthcare (16:10) - AI in cybersecurity (17:37) - How cybercriminals are using AI? (20:05) - Follow-up scams (21:34) - How to fight AI scams? (23:04) - Nobody is prepared (24:40) - AI trends in 2025 (27:14) - AI-generated content (29:00) - AI in CyberSec predictions in 2025 (30:00) - What people get wrong about AI? (31:55) - Outro  Connect With Us: ⁠⁠⁠⁠X⁠⁠⁠⁠ | ⁠⁠⁠⁠Instagram⁠⁠⁠⁠ | ⁠⁠⁠⁠TikTok⁠⁠⁠⁠ | ⁠⁠⁠⁠Facebook⁠⁠⁠⁠ | ⁠⁠⁠⁠LinkedIn⁠⁠⁠⁠ | ⁠⁠⁠⁠Youtube⁠⁠⁠⁠ ⁠⁠⁠⁠Our Main Site⁠⁠⁠⁠ | ⁠⁠⁠⁠WeLiveSecurity⁠⁠⁠⁠ | ⁠⁠⁠⁠Corporate Blog

    34 min
  7. 01/31/2025

    What is Penetration Testing?

    In this episode of Unlocked 403, cybersecurity podcast, Becks dives into the fascinating world of ethical hacking with two expert pentesters! Together, they explore the ins and outs of online and offline ethical hacking, breaking down how professionals identify vulnerabilities while staying on the right side of the law. From social engineering tricks to internal testing strategies, you’ll get an inside look at how pentesters approach their craft, plus, how shockingly easy it is to disable a home alarm system – and how to protect yourself from these types of attacks. For more info on ESET Services and how to contact us, click this link Don’t forget to like, comment, and subscribe for more episodes of Unlocked 403. Topics: (00:00) - Intro (00:53) - What is penetration testing? (02:54) - Permission to hack (04:15) - What does pentesting look like? 05:09 - Reversing the source code (06:08) - Social engineering (07:08) - Prank people for a living (08:32) - Physical penetration testing (08:53) - The easiest way to get into any building (09:31) - Live demo of Replay attack (15:34) - Which industries need pentesting most? (17:40) - AI & Ethical hacking (21:56) - How to get into pentesting? (23:49) - Tips to stay safe online (27:05) - Where can you learn more about pentesting? (28:52) - Outro Connect With Us: ⁠⁠⁠X⁠⁠⁠ | ⁠⁠⁠Instagram⁠⁠⁠ | ⁠⁠⁠TikTok⁠⁠⁠ | ⁠⁠⁠Facebook⁠⁠⁠ | ⁠⁠⁠LinkedIn⁠⁠⁠ | ⁠⁠⁠Youtube⁠⁠⁠ ⁠⁠⁠Our Main Site⁠⁠⁠ | ⁠⁠⁠WeLiveSecurity⁠⁠⁠ | ⁠⁠⁠Corporate Blog

    30 min
  8. 12/13/2024

    Unwrapping Christmas Scams

    Holiday cheer is in the air, but so are the scammers! In this festive episode of Unlocked 403, a cybersecurity podcast brought to you by ESET, we dive into the sneaky world of online Christmas scams. Becks is joined by Jake Moore, Global Security Advisor at ESET, to expose the tactics scammers use to exploit the holiday season—from fake shopping deals to phishing emails. Stick around until the end for a surprise appearance you won’t want to miss! Don't let scams ruin your holiday spirit and make this season merry and secure! Follow Jake Moore: LinkedIn Topics: (00:00) - Intro. (01:04) - Who is Jake Moore? (01:40) - Why is the holiday season a prime time for scammers? (03:23) - Has AI changed scamming tactics? (05:06) - What generation is more vulnerable to scams? (06:28) - Targeted attacks. (08:22) - Why are people falling for scams? (09:57) - Most common attacks. (11:03) - How do scammers use social media? (13:46) - “Secret sister” scam. (15:11) - Has Jake ever been scammed? (16:29) - Data privacy tests by Jake. (19:05) - Do not engage with scammers. (20:15) - AI-Granny. (21:32) - Deepfakes. (24:06) - Future of deepfake scams. (28:31) - What to do if you’ve been scammed? (29:24) - Physical crime vs. Cyber-crime investigation (32:48) - TOP 3 tips to stay safe online. (33:23) - Favorite Christmas movie. (34:32) - PRESENTS! (36:15) - Outro. Connect With Us: ⁠⁠X⁠⁠ | ⁠⁠Instagram⁠⁠ | ⁠⁠TikTok⁠⁠ | ⁠⁠Facebook⁠⁠ | ⁠⁠LinkedIn⁠⁠ | ⁠⁠Youtube⁠⁠ ⁠⁠Our Main Site⁠⁠ | ⁠⁠WeLiveSecurity⁠⁠ | ⁠⁠Corporate Blog

    37 min

About

Cybersecurity Podcast - We want to bring cybersecurity to your ears, educate as well entertain you all at once. No worries, if you are new to the topic of digital security, we´ve got you covered. If you feel at home in cyberspace, we invite you to listen to experts from ESET, talk about their fascinating jobs as well as the latest threats and trends.