Best Ransomware podcasts we could find (Updated March 2019)
Related podcasts: Security Tech Hacking Hackers Malware Cybersecurity Cyber Technology Business News Education Whitehat Cyber Criminals Wi-fi Phishing Mcafee Digital Web Software Development Gadgets  
Ransomware public [search 0]
×
Join millions of Player FM users today to get Ransomware news and insights whenever you like, even when you're offline. Podcast smarter with the podcast app that refuses to compromise … it's free and easy.
Podcast smarter! Player FM is free and easy.
show episodes
 
H
Hackable?
Monthly
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are.Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
Defend your digital life! Cybersecurity and online privacy tactics for you and your family. https://DefendingDigital.comDefending Digital’s mission is to empower individuals and parents to increase their digital security and privacy. By increasing awareness and education, together we can reduce scams, malware infections, identity theft, ransomware, and other negative experiences.
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
S
Storage Unpacked
Weekly
 
A weekly podcast on deploying and managing enterprise storage and data
 
Stay up-to-date with what’s happening in the digital world the easy way! Digital expert, national radio host and USA Today columnist Kim Komando wastes no time and gets right to the top stories, scams, security alerts, product reviews and crazy happenings in the world of tech. Listen and you’ll be in the know with Kim Komando!
 
1
10 on Tech
Monthly
 
10 on Tech brings enterprise IT industry experts on the show to bring you up to speed on emerging technology in just ten minutes! This show is produced by ActualTech Media and often features ATM Partners and community figures like James Green (@jdgreen), David Davis (@davidmdavis), and Scott D. Lowe (@otherscottlowe).
 
A podcast for people who use English as a Second or Foreign Language (ESL/EFL) in their work environment and want to improve their overall language skills. In each episode, hosts Skip Montreux, Dez Morgan, and Samantha Vega discuss Business news making headlines around the world. Through their discussions, Skip, Dez and Samantha introduce English vocabulary & phrases related to business, review grammar, and identify cultural differences found in International business situations. An excellen ...
 
T
Tech2Ears
Monthly+
 
We talk about technology and professional development Become a supporter of this podcast:https://anchor.fm/melvin-williams0/support
 
Ryan Naraine is the host of the SecurityWeek podcast series "Security Conversations". He is the head of Kaspersky Lab's Global Research & Analysis team in the USA and has extensive experience in computer security user education, specializing in operating system and third-party application vulnerabilities, zero-day attacks, social engineering and social networking threats.
 
Stay Safe from Cyber Crime!
 
Microsoft Services Premier Support gives you direct access to the world's top Microsoft technical experts, pairing you with a dedicated support team providing 24/7 hands-on assistance. "Taste of Premier" is dedicated to helping you maximize your company's IT infrastructure and development investment by showcasing the latest Microsoft products and services and demonstrating how these technologies can positively impact your bottom line. Click here to learn more about Microsoft Service Premier ...
 
Microsoft Services Premier Support gives you direct access to the world's top Microsoft technical experts, pairing you with a dedicated support team providing 24/7 hands-on assistance. "Taste of Premier" is dedicated to helping you maximize your company's IT infrastructure and development investment by showcasing the latest Microsoft products and services and demonstrating how these technologies can positively impact your bottom line. Click here to learn more about Microsoft Service Premier ...
 
I
ICIT Podcast
Rare
 
A tactical, bipartisan forum of Federal Agency executives, legislative community members and industry leaders focused on solutions based strategies to our Nation's critical infrastructure obstacles‏
 
Loading …
show series
 
Investigators from McAfee's advanced threat research unit, working with partners at Coveware, have reevaluated hasty attributions of Ryuk ransomware to North Korea and have explored the inner workings of the threat. John Fokker is head of cyber investigations in McAfee's Advanced Threat research unit. He join us to share their findings. The ori ...…
 
In today’s podcast, we hear that Finland’s data protection authority is investigating reports that Nokia 7 Plus smartphones are sending data to a Chinese telecom server. Thousands of API tokens and cryptographic keys are exposed in public GitHub repositories. The US government warns that certain cardiac devices can be hacked from close range. A ...…
 
Facebook stored hundreds of millions of unprotected passwords for years. If you’re filing a disability claim, be careful what you post on social media -- the government is watching. Ransomware attacks are becoming more personalized. A new smart paintbrush can turn anyone into a digital artist. AT&T's CEO is embarrassed by a robocall. How to avo ...…
 
OT, IoT and systems targeted by cryptominers - those are among the main network security concerns of Greg Young, VP of cybersecurity at Trend Micro. Which technology trends should security leaders follow to improve network security? Young shares his insight.
 
This week, Chris talks to Jerome McFarland, VP of Marketing with Elastifile, Inc. Elastifile has developed a scale-out distributed file system called ECFS – the Elastifile Cloud File System. ECFS runs either on-premises, in the public cloud as a marketplace offering or, most recently as a full native storage service in GCP. In addition to the b ...…
 
The latest edition of the ISMG Security Report discusses the recent ransomware attack on aluminum giant, Norsk Hydro. Plus, confessions of a former LulzSec and Anonymous hacktivist, and the growing problem of cyber extortion.
 
Fancy Bear and Sandworm are launching cyberespionage campaigns against European governments before the EU parliamentary elections. The FIN7 cybercrime group is still active, and it’s using new malware. A scammer stole more than $100 million from Google and Facebook. Facebook stored hundreds of millions of passwords in plaintext for years. And c ...…
 
In today’s podcast, we hear that Norsk Hydro’s recovery continues, with high marks for transparency. Some notes on the challenges of deterrence in cyberspace from yesterday’s CYBERSEC DC conference, along with context for US skepticism about Huawei hardware. Cookiebot says the EU is out of compliance with GDPR, it’s sites infested with data-scr ...…
 
Be safer on social media by following these 15 security and privacy tips. Full post: https://defendingdigital.com/15-social/ This podcast is sponsored by Flipboard
 
In today’s podcast, we hear that an aluminum manufacturing giant in Norway has suffered a major ransomware attack. A new version of the Mirai botnet malware is targeting enterprise systems. The US Homeland Security Secretary says the private sector and the government in the United States need to work together against cyber threats. Europol has ...…
 
In today’s podcast we hear about content moderation in the aftermath of the New Zealand mosque shootings. A shift in Huawei’s strategy in the face of Five Eye--and especially US--sanctions: the US doesn’t like us because we’re a threat to their ability to conduct untrammeled surveillance. Corruption, neglect, and replacement of experts by polit ...…
 
Akamai's Larry Cashdollar joins us to describe an exploit he recently came across while researching MageCart incidents. It's a remote command execution vulnerability affecting ThinkPHP, a popular web framework. The original research can be found here: https://blogs.akamai.com/sitr/2019/01/thinkphp-exploit-actively-exploited-in-the-wild.html The ...…
 
In today’s podcast, we hear that a terror attack against two New Zealand mosques is announced on Twitter and live-streamed on Facebook. A new, unobtrusive JavaScript sniffer infests some e-commerce sites in the UK and the US. Cryptojacking finds its way into the cloud. A look at the consequences of regulation, both good and bad. How CISOs will ...…
 
Check your laptop’s battery: There’s another big recall involving batteries that could catch fire. Targeted advertising might soon be annoying you through your smart TV. Research shows many Android anti-virus apps don’t work. Facebook had a major power outage that was believed to be a server error, but could it have been a hack? An AI-powered r ...…
 
ISMG and Zscaler hosted a roundtable dinner in Columbus, OH on Feb. 22 focused on security's role in digital transformation. Managing expectation for security as a core component of business enablement was a core component of the discussion.
 
In the latest stop in this roundtable dinner series, ISMG and Zscaler visited Seattle on Feb. 26 to discuss security's role as a catalyst for digital transformation. It was a diverse crowd - and a mature conversation, says Bil Harmer, Americas CISO with Zscaler.
 
This week, Martin leads the conversation as Chris discusses the vendors presenting at the recent Storage Field Day 18 event. SFD18 is part of the Tech Field Day series delivered by Stephen Foskett and GestaltIT. We last spoke with Stephen in April 2018 – an episode on why storage isn’t boring. Although there’s no official theme for SFD events, ...…
 
The latest edition of the ISMG Security Report features a discussion of the role of "prosilience" in IoT security, plus the problem of overnotification under GDPR and the notion of "Spartacus as a Service."
 
In today’s podcast, we hear that Indonesia says it’s got its voting security under control, and a lot of the problems sound like good old familiar fraud and dirty campaigning. Trustwave warns of a watering hole on a Pakistani government site. Recorded Future goes RAT hunting. Proofpoint offers a look at “intelligent brute-forcing.” Kaspersky re ...…
 
In today’s podcast, we hear that election interference concerns persist around the world. Governments seek to address them with a mix of threat intelligence and attention to security basics. A US Navy report says the Fleet’s supply chain is well on the way to being pwned by Chinese intelligence. Undersea cables are a center of Sino-US competiti ...…
 
Machine learning can play an important role in fraud prevention at financial institutions, says Marc Trepanier of ACI Worldwide, who addresses the challenges involved.
 
In today’s podcast, we hear an update on Venezuela and its power outages. Amplification of social media posts as a form of mass persuasion. A look at how control of the Internet has replaced control of the radio station as a move in civil war and coup or counter-coup planning. Asian game makers get backdoored out of China. Decryptors are out fo ...…
 
Venezuela sustains power outages, and the regime blames hackers and wreckers. The opposition says it’s all due to the regime’s corruption, incompetence, and neglect. Citrix loses business documents in what might have been an Iranian espionage operation. Huawei’s suit against the US gets some official cheering from Beijing. The US warns against ...…
 
Vitali Kremez is a Director of Research at Flashpoint. His team discovered that the recently disclosed intrusion suffered in December 2018 by Chilean interbank network Redbanc involved PowerRatankba, a malware toolkit with ties to North Korea-linked group Lazarus. The intrusion represents the latest known example of Lazarus-affiliated tools bei ...…
 
In today’s podcast, we hear that Chinese information operations on US social media are widespread. The Egyptian government launches spear phishing attacks against activists. Hundreds of millions of email records were found online. Chelsea Manning is back in jail. The US is retaliating for Chinese cyberespionage. And Facebook wants to change its ...…
 
Mark Zuckerberg says he wants a privacy-focused Facebook. Doctored photos are the new trend for real estate listings. Hackers are stealing from fraudsters who tricked their subscribers. Google can now make phone calls to book restaurant reservations. Alexa can control your Roku streaming devices. The best software for filing 2019 taxes. All tha ...…
 
This week, Chris talks to Vince Westin, Technical Evangelist within the PowerMax Group at Dell EMC. PowerMax is the latest in a storage product line with lineage back to the original Symmetrix systems of the early 1990s. PowerMax is an all-NVMe storage array, reflecting an industry move towards faster, low latency media. Vince takes us through ...…
 
The latest edition of the ISMG Security Report features updates from RSA Conference 2019 on IoT and the cloud, GDPR compliance challenges and much more.
 
The scope of Iran-linked APT33 cyberattacks has been revealed. GandCrab criminals are using more sophisticated tactics. A new type of malware was using Slack to communicate. Chrome gets an important update. Huawei sues the US, and Germany sets tougher security rules for telecom companies. And people who invest in cryptocurrency often don't know ...…
 
In today’s podcast, we hear that Australia's former prime minister warns Britain about Chinese tech companies. Symantec says Whitefly was behind SingHealth's massive data breach. Iranian hackers show code overlap. Intel CPUs are vulnerable to another speculative execution flaw. The NSA hasn't been using its domestic phone surveillance program l ...…
 
In today’s podcast, we hear that Australia's former prime minister warns Britain about Chinese tech companies. Symantec says Whitefly was behind SingHealth's massive data breach. Iranian hackers show code overlap. Intel CPUs are vulnerable to another speculative execution flaw. The NSA hasn't been using its domestic phone surveillance program l ...…
 
How safe are Apple Pay, Google Pay, PayPal, and other digital wallets and mobile payments? Learn how their security compares to credit cards and other traditional payment methods. Full post: https://defendingdigital.com/how-secure-are-digital-wallets-and-mobile-payments/ This podcast is sponsored by Flipboard…
 
In today’s podcast, we hear that India went on the offensive when its government websites were attacked by hackers from Pakistan. Rob Joyce, Senior Advisor for Cybersecurity Strategy to the Director of the US National Security Agency, discusses trends in cyber conflict. A Chinese cyberespionage group hacks for maritime technologies. Facebook le ...…
 
In today’s podcast, we hear that Operation Sharpshooter is linked to North Korea. Canada begins the extradition process for Meng Wanzhou. Huawei is planning to sue the US for banning its equipment from government use. Facebook may have used questionable tactics to lobby against stricter data protection laws. Thailand passes a controversial cybe ...…
 
“Risk Management” needs to be more than a slogan, if you want to protect your most valuable assets: it needs to be a mindset. It needs to be a way of life for your organization. To that end, consider the warning of Vijay Chauhan, Sr. Director of Product Marketing for Illumio, that a risk-free environment doesn’t exist. The conversation then bec ...…
 
Identity and access management is more complicated when organizations rely on a cloud infrastructure, says Brandon Swafford, CISO at Waterbury, Connecticut-based Webster Bank, who describes the challenges in an interview.
 
Researchers at Zscaler have been tracking a variety fake versions of the popular Fortnite game on the Google Play store, along with associated scams. Deepen Desai is head of security research at Zscaler, and he joins us to share their findings. The original research can be found here: https://www.zscaler.com/blogs/research/fake-fortnite-apps-sc ...…
 
Qbot infections are spreading. The bounty-hunting gig economy apparently has its first millionaire. Observers are liking what they see in US Cyber Command’s “persistent engagement.” Canada mulls the extradition of Huawei’s CFO to the US. The US continues to call Huawei a security risk, and Huawei has some things to say back. The Momo Challenge ...…
 
An open database exposes millions of records from a Dow Jones watchlist. IBM is apologizing after racially insensitive terms were found as options on their job site. Motorola has confirmed they’re also releasing a foldable phone. Amazon is working on even more ways to get packages to you. A robot replica of a long-dead deity is teaching Buddhis ...…
 
This episode was recorded while Chris was in Silicon Valley for Storage Field Day 18. Although not part of the event, Chris took time to catch up with Pavilion Data. in particular Jeff Sosa, VP Product Management and Walt Hinton, Head of Corporate and Product Marketing. Both Jeff and Walt have a long history in the storage industry, including c ...…
 
The latest edition of the ISMG Security Report features Greg Touhill, the United States' first federal CISO, discussing how "reskilling" can help fill cybersecurity job vacancies. Plus, California considers tougher breach notification requirements; curtailing the use of vulnerable mobile networks.
 
In today’s podcast we hear that a misconfigured Amazon Web Services database has exposed a risk screening database--and it seems the exposure itself was an instance of third-party risk. Farewell to Coinhive, long a favorite of cryptominers everywhere. Intel pulls back from a 5G project with a Chinese partner. A quick look at Bronze Union, and w ...…
 
In today’s podcast, we hear that Nokia routers have been found vulnerable to man-in-the-middle and denial-of-service attacks. As one would expect, the US and North Korean summit in Hanoi this week summons up some hacking. Ukraine accuses Russia of DDoS attacks in the service of election disruption. US Cyber Command played some chin music for St ...…
 
In today’s podcast, we hear updates on suspicions of Chinese operators. Some trend reports from IBM and NETSCOUT. Bare-metal cloud services get reflashed. USB-C ports may be more vulnerable than thought to direct memory access attacks. Credential-stuffing attacks hit users of online tax-preparation services. And that missile attack on Tampa was ...…
 
How can the many job openings for cybersecurity specialists be filled? "Reskilling" can play a critical role, says Greg Touhill, the nation's first federal CISO, who's now president of Cyxtera Technologies. In an interview, he offers a preview of his upcoming presentation at the RSA Conference 2019.
 
IT moves fast. That’s not news. But these days, it seems to be moving faster than ever. Where it’s going, and what it means for your career, is a question that needs answers. That’s why this episode of “10 on Tech” features one of the industry’s most knowledgeable analysts, Wikibon’s Stu Miniman. Stu chats with ActualTech Media Partner James Gr ...…
 
In today’s podcast, we hear that ICANN has warned of a DNS hijacking wave, and is urging widespread DNSSEC adoption. Security firms see Iran as a particularly active DNS hijacker. A B0r0nt0k ransomware outbreak infests Linux servers, but Windows users might be at risk as well. A request for whitelisting in the Firefox certificate store arouses ...…
 
Researchers at security firm Cylance have been tracking a threat group targeting the Rosneft Russian oil company. As Cylance uncovered details, suspicions shifted from state-sponsored espionage to business email compromise. Kevin Livelli is director of threat intelligence at Cylance, and he joins us to share what they found. The original resear ...…
 
In today’s podcast, we hear that Kiev says it’s found complex, large-scale Russian influence operations in Ukraine’s presidential election. Australian investigators are said to be closer to concluding that recent hacking attempts were the work of Chinese intelligence services. There’s also plenty of ordinary crime to go around. Huawei continues ...…
 
YouTube is pulling hundreds of channels and deleting millions of comments after an outcry over child exploitation. If you have a drone, make sure you get a registration number. Samsung has unveiled their new folding phone, along with a lot of other new tech. We’re getting a glimpse at just how far China goes with their mass surveillance. Apple ...…
 
Google login Twitter login Classic login