meta_pixel
Tapesearch Logo
Log in
Turley Talks

Ep. 2985 Elon’s SPACE X Taking OVER NASA!

Turley Talks

[email protected]

Daily News, News Commentary, Politics, News

4.81.2K Ratings

🗓️ 7 December 2024

⏱️ 15 minutes

🧾️ Download transcript

Summary

Stay ahead of what’s coming and secure your privacy today. Again, that’s http://slnt.com/TURLEY for 15% off and free shipping on qualified orders.

*The content presented by our partners may contain affiliate links. When you click and shop the links, Turley Talks may receive a small commission.* 


--

Join my new Courageous Conservative Club and get equipped to fight back and restore foundational values. 
Learn more at http://fight.turleytalks.com/join


Thank you for taking the time to listen to this episode.  If you enjoyed this episode, please subscribe and/or leave a review.

FOLLOW me on X (Twitter): https://twitter.com/DrTurleyTalks

Sign up for the 'New Conservative Age Rising' Email Alerts to get lots of articles on conservative trends: https://turleytalks.com/subscribe-to-our-newsletter

**The use of any copyrighted material in this video is done so for educational and informational purposes only including parody, commentary, and criticism. See Hosseinzadeh v. Klein, 276 F.Supp.3d 34 (S.D.N.Y. 2017); Equals Three, LLC v. Jukin Media, Inc., 139 F. Supp. 3d 1094 (C.D. Cal. 2015). It is believed that this constitutes a "fair use" of any such copyrighted material as provided for in section 107 of the US Copyright Law.

Transcript

Click on a timestamp to play from that location

0:00.0

The liberal globalist order is at its brink and awakening a new conservative age.

0:06.5

I'm Dr. Steve Turley.

0:08.1

Join me every day as we discover answers to today's toughest challenges and explore the

0:14.1

revitalization of conservative civilization.

0:17.9

This is Turley Talks.

0:26.6

So this is used for an ethical person to do a penetration test on a company. What does an unethical hacker do with that tool right there?

0:29.6

An unethical hacker can use this tool to steal people's credentials, to monitor, and, you know, to spy on people, to look through your webcam, to try to get access

0:40.1

to your network, to your phone, you know, they're going to do it for, you know, they got,

0:44.3

the criminals do bad things.

0:46.2

And ethical hackers going to try to access your computer, to access other computers, to try

0:50.6

to take over your company so that you can show where the weaknesses are so you can make it better.

0:56.0

So it's essentially the same concepts, though, but one has a good goal in mind.

1:01.0

The other one has, you know, screwing someone over in mind.

1:06.0

Hey, gang, it's me, Dr. Steve, and, you know, I hate to to say it but criminals are on the rise uh listen to this

1:14.0

stat in twenty twenty three ransomware attacks were estimated to have occurred get this every 39 seconds

1:23.0

now if you don't know ransomware is a type of digital malware that encrypts data on a device

1:29.5

or network forcing the victim to pay to unlock it.

1:33.8

Well, the average time to identify a breach is 194 days, and the average life cycle of a breach

1:42.1

is 292 days, and there's clearly an incentive for ransomware.

1:47.6

Again, listen to this.

1:48.8

The likelihood that a cybercrime entity is detected and prosecuting the United States,

1:55.2

it's estimated around 0.05%.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from [email protected], and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of [email protected] and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.