Encryption public
[search 0]
More
Download the App!
show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Self-Hosted

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
  continue reading
 
Classic tales of supernatural horror and suspense are brought to life in this series of audiobooks featuring the works of E.F.Benson, Saki, H.P. Lovecraft, Bram Stoker, and more. Fans of the creepiest, spookiest podcasts will thrill to the immersive retellings of these nightmarish short stories from the vaults of terror, complete with compelling narration, sound effects and music. As told by the mysterious Jasper L'Estrange, EnCrypted: The Classic Horror Podcast is your new home for scary st ...
  continue reading
 
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
  continue reading
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Venture into the elusive world of intelligence collection and espionage to spot, assess and debrief: spies, handlers, catchers, analysts, cut-outs, dangles, diplomats, security experts and the storytellers who bring them all to life. Check your electronics and subscribe, do a thorough surveillance detection route, secure your Live Drop location, and after a mad-minute introduction, listen in on conversations with our fascinating guests who help to illuminate a complex universe. A HUMINT expe ...
  continue reading
 
WIRED’s Gadget Lab podcast breaks down which gadgets, apps, and services you need to know about, and which ones you can move to the virtual trash bin. Learn how today’s tech shapes our lives—plus get your hosts’ personal recommendations at the end of each episode. Share your thoughts on WIRED Gadget Lab. As a token of our appreciation, you will be eligible to enter a prize drawing up to $1,000 after you complete the survey. https://selfserve.decipherinc.com/survey/selfserve/222b/76152?pin=1& ...
  continue reading
 
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
  continue reading
 
Artwork

1
TechSNAP in HD

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP OGG

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork
 
Crime World, with Nicola Tallant, is an Irish podcast about criminals, drugs and the sins of the underworld. Discussing the real stories, and the real people, behind the grisly headlines. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
TechSNAP Large Video

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
Day[0]

dayzerosec

Unsubscribe
Unsubscribe
Monthly+
 
A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.
  continue reading
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
  continue reading
 
Artwork
 
What if a Quantum Computing aficionado with expertise in Artificial Intelligence and Machine Learning talked to a security expert interested in how Quantum Computing already impacts the world?
  continue reading
 
Artwork

51
TechSNAP Mobile Video

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
  continue reading
 
A compendium of podcasts from the Chief TWiT, Leo Laporte. This feed includes all of Leo's audio or video releases and sometimes includes his appearances on other podcasts. One feed to serve them all.
  continue reading
 
Artwork
 
The Technado crew covers a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
  continue reading
 
Artwork

1
Mostly Security

Jon King and Eric Wuehler

Unsubscribe
Unsubscribe
Weekly
 
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork

1
In Conversation With

Internet Watch Foundation (IWF)

Unsubscribe
Unsubscribe
Monthly
 
A series of shortcasts from the Internet Watch Foundation (IWF) about their leading non-profit work tackling online child sexual abuse. Our series of short podcasts feature discussions with leading experts and academics covering a wide variety of topics including tech, encryption, policy and how these impact the criminal circulation of child sexual imagery online. Find out more at iwf.org.uk
  continue reading
 
Artwork

1
Small Business Cybersecurity Podcast

Small Business Cybersecurity Podcast

Unsubscribe
Unsubscribe
Monthly
 
Our podcast is for partners, owners and CEOs of small businesses to keep informed on risks and mitigation strategies regarding IT services and cyber security products that work well in a small business environment. Femi and Stephen will talk candidly and go between the headlines of global cyber security events and malware and bring it back to how it may affect small businesses in particular.
  continue reading
 
Deep-dive discussions with the smartest developers we know, explaining what they're working on, how they're trying to move the industry forward, and what we can learn from them. You might find the solution to your next architectural headache, pick up a new programming language, or just hear some good war stories from the frontline of technology. Join your host Kris Jenkins as we try to figure out what tomorrow's computing will look like the best way we know how - by listening directly to the ...
  continue reading
 
A compendium of podcasts from the Chief TWiT, Leo Laporte. This feed includes all of Leo's audio or video releases and sometimes includes his appearances on other podcasts. One feed to serve them all.
  continue reading
 
Loading …
show series
 
In this week's episode, we discuss Microsoft's summit with vendors on their intention to lock down the Windows kernel from endpoint security drivers and possibly anti-cheats. We also talk cryptography and about the problems of nonce reuse. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/256.html […
  continue reading
 
A lost traveller finds refuge in a desolate upland inn. At first he is grateful for the hospitality of the innkeeper and his wife, but the peculiar behaviour of the Sasserach brothers begins to make him feel increasingly uneasy.This original recording is an audio presentation (with sound effects and music) by Jasper L'Estrange for EnCrypted Horror.…
  continue reading
 
This week we take a look at what you can do with a GPU when you get away from just using it to draw polygons. Agnès Leroy has spent most of her career programming, optimizing and converting programs to run on that oh-so-curious piece of specialised processing hardware, and we go through all the places that journey has taken her. From simulating the…
  continue reading
 
Do you know how asymmetric encryption works? While at the Kansas City Developers Conference, Richard sat down with Eli Holderness to discuss many of the encryption technologies being used today—and the new options coming in the future! Eli talks about how symmetrical encryption and public key encryption have been the focus of modern encryption, esp…
  continue reading
 
Drug raids across Ireland target the organised crime group known as The Family. Almost €7 million worth of cocaine is seized and 100 Gardaí are part of the offensive. But in the background, another significant blow to criminal groupings is coming in the form of a Europol announcement due to take place tomorrow about the latest action against an enc…
  continue reading
 
Encrypted messaging is a godsend for mobile communications, whether you’re just sending standard texts to your friends that you want kept private, or engaging in interactions that are better kept secret for safety reasons. Apps like Signal and Telegram offer users the ability to trade messages that can be read by only the sender and the receiver. O…
  continue reading
 
Telegram puts End-to-End Privacy in the Crosshairs Free security logging is good for everyone CrowdStrike hemorrhaging customers Microsoft to meet privately with EDR (Endpoint Detection & Response) vendors Yelp's Unhappy with Google Telegram as the hotbed for DDoSass – DDoS as a Service Chrome grows more difficult to exploit Cox Media Group's "Acti…
  continue reading
 
Telegram puts End-to-End Privacy in the Crosshairs Free security logging is good for everyone CrowdStrike hemorrhaging customers Microsoft to meet privately with EDR (Endpoint Detection & Response) vendors Yelp's Unhappy with Google Telegram as the hotbed for DDoSass – DDoS as a Service Chrome grows more difficult to exploit Cox Media Group's "Acti…
  continue reading
 
In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is co-host Kevin Johnson, bringing his trademark opinions. We also talk about some intriguing documentaries, including ‘LulaRich’ about the LuLaRoe le…
  continue reading
 
Summary: In this episode, we dive into the challenges of willpower and temptation, particularly around the irresistible allure of ice cream. We share personal anecdotes about the struggle to resist indulgent treats and the humorous consequences that follow. The conversation then shifts to the benefits of removing temptations and creating friction t…
  continue reading
 
Mike Burgess is the director general of ASIO. But the thing about Mike is he’s actually a cybersecurity guy. He joined ASD, Australia’s NSA, back in 1995 when it was still the Defence Signals Directorate. He was there for 18 years before he bounced out to the private sector for a while to work as the CISO for Australia’s largest telco, Telstra. In …
  continue reading
 
In episode three of the Crime World Book Club, Clodagh is joined by singer Janet Grogan who you will know from the X Factor, Last Singer Standing and Euro Song. They discuss her favourite true crime book, I'll Be Gone in the Dark by Michelle McNamara which follows the author's investigation into uncovering the identity of the Golden State Killer. T…
  continue reading
 
The mother and uncle of Kerry Sinaloa Cartel man Morris O’Shea Salazar have lost appeals against their drug trafficking convictions in Chile where they are jailed on lengthy sentences. Yolanda Salazar who moved to Kilorglin with her young son after her Irish husband died will now have to serve 18 years in a Chilean prison after she was refused leni…
  continue reading
 
A secretive Kinahan lieutenant is linked to the French underworld in an investigation probing who sold the doomed Encrochat phones to criminals. Nicola speaks with Niall Donald about CIaran ‘Sam’ O’Sullivan and his sidekick Robert Noctor and their hideaway high in the French alps. Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
In Episode 347, we discuss the recent alarming incidents involving exploding pagers targeting Hezbollah operatives in Lebanon, which resulted in multiple casualties. We clarify why this is not a cyber attack and should not cause widespread panic about personal device safety. Additionally, we cover Instagram’s new policies to default teen accounts t…
  continue reading
 
Amazon Returns to Office, CA AI Bill, Elon Backs Down Discussion of the iPhone 16 Qualcomm Approached Intel About a Takeover in Recent Days Hezbollah Pagers Explode in Apparent Attack Across Lebanon Elon Musk's X Backs Down in Brazil Bluesky tops 10 million users Newsom signs California bill to limit 'addictive' social media feeds for kids The AI b…
  continue reading
 
Amazon Returns to Office, CA AI Bill, Elon Backs Down Discussion of the iPhone 16 Qualcomm Approached Intel About a Takeover in Recent Days Hezbollah Pagers Explode in Apparent Attack Across Lebanon Elon Musk's X Backs Down in Brazil Bluesky tops 10 million users Newsom signs California bill to limit 'addictive' social media feeds for kids The AI b…
  continue reading
 
Eric's nest has emptied, and Jon's pantry is full of asian pear derivatives. Temu denies (rightly?) that the data didn't come from them, Transport for London has to restore 30k employee creds in person, and why not to let the authoritative server for a domain expire. For fun we have another word puzzle by the NYT, and estimating an avatar's gaze at…
  continue reading
 
https://youtu.be/4sfIBRTcRpU https://odysee.com/@NaomiBrockwell:4/HIPAA:7 Most people think that HIPAA means that their medical records are kept private. But what if I told you that HIPAA doesn’t protect your privacy at all? This is our first video in a series about medical privacy, specifically looking at legislation that stripped individuals of t…
  continue reading
 
Alex has been playing around at the speed of light while solving Proxmox problems, and Chris has solved a Jellyfin issue. Plus, our thoughts on the new Plex features. Sponsored By: Unraid: Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Grist: Grist - the open-source alternative …
  continue reading
 
The inquest into the death of murder accused Keith Lee has heard that he died by suicide in a cell in Mountjoy Jail as he faced charges for killing his wife Joanne Ball whose body lay wrapped in a sleeping bag in the wardrobe of his bedsit for up to six days after she’d been killed. Nicola speaks with Niall Donald about a controlling relationship t…
  continue reading
 
One surefire way to go viral on Threads—the Meta-owned Instagram-spinoff social network with more than 200 million users—is to ask a ridiculous question that enrages your followers so much, they just have to chime in to answer you, mock you, or berate you. When it first launched last summer, Threads was seen as a blatant Twitter clone. At the time,…
  continue reading
 
Former Superintendent John ‘Spud’ Murphy has been moved to the open prison Shelton Abbey where he will now have to mix with killers and rapists for the first time. The crooked cop who was caught stashing drugs in his Dublin home is serving a prison term while still under investigation for allegations that he worked with criminal gangs during a high…
  continue reading
 
Summary: In this lively episode, we dive into the spontaneous and community-driven spirit of Bitcoin Park, where the idea of hosting a monthly mining meetup was born. The episode kicks off with a humorous recount of how a simple message about grilling burgers led to acquiring a high-end griddle, setting the tone for the casual yet passionate discus…
  continue reading
 
Kinahan Cartel leader Thomas 'Bomber' Kavanagh and his brother-in-law Liam Byrne made a shock U-turn earlier today when they changed their plea to guilty in the Old Bailey as their trial for a gun plot was about to get underway. Nicola speaks with Niall Donald about the pleas and the code of Omertà and about the fate of their co-accused Hosted on A…
  continue reading
 
Seizures of €16 million of drugs, 11 high-value targets arrested and four organised crime groups targeted after an encrypted phone network called Ghost is taken down. Nicola speaks with Niall Donald about the global law enforcement operation which targeted Australian and Irish gangs. Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
On this week’s show, Patrick Gray and Adam Boileau discuss the weeks security news, including: Hezbollah’s attempts to avoid SIGINT with pagers ends in explosions The US shines many bright lights on RT’s disinfo role Australia counters Chinese bullying in the Pacific Valid accounts are the most prevalent entry point, says CISA’s data Ivanti and For…
  continue reading
 
On this week’s show, Patrick Gray and Adam Boileau discuss the weeks security news, including: Hezbollah’s attempts to avoid SIGINT with pagers ends in explosions The US shines many bright lights on RT’s disinfo role Australia counters Chinese bullying in the Pacific Valid accounts are the most prevalent entry point, says CISA’s data Ivanti and For…
  continue reading
 
Windows Endpoint Security Ecosystem Summit Aging storage media does NOT last forever How Navy chiefs conspired to get themselves illegal warship Wi-Fi adam:ONE named the #1 best Secure Access Service Edge (SASE) solution AI Talk Password Manager Injection Attacks Show Notes - https://www.grc.com/sn/SN-992-Notes.pdf Hosts: Steve Gibson and Mikah Sar…
  continue reading
 
Windows Endpoint Security Ecosystem Summit Aging storage media does NOT last forever How Navy chiefs conspired to get themselves illegal warship Wi-Fi adam:ONE named the #1 best Secure Access Service Edge (SASE) solution AI Talk Password Manager Injection Attacks Show Notes - https://www.grc.com/sn/SN-992-Notes.pdf Hosts: Steve Gibson and Mikah Sar…
  continue reading
 
In episode two of the Crime World Book Club, Clodagh is joined by Oisin Feeney, host of The Troubles Podcast. They discuss 'Killing Thatcher' by Rory Carroll which details the IRA’s attempt to assassinate Margaret Thatcher and the investigation that followed. You can find Oisin on Instagram @thetroublespodcast and listen wherever you get your podca…
  continue reading
 
In Episode 96, Patrick and Ciprian sit down with Scott Genin, Vice President of Materials Discovery at OTI Luminotics. Together, they delve into cutting-edge topics including cathode patterning materials, the role of computational chemistry in innovation, and the exciting possibilities of programmable bosonic sampling. Scott Genin is the Vice Presi…
  continue reading
 
A woman reported killer Johnny Creswell to the PSNI in 2016, four years before he murdered Katie Simpson, after he had exposed himself to her at a horseyard in County Antrim. The victim told the PSNI that he was dangerous, had threatened her boyfriend and had boasted about the horrendous violence he'd doled out to his ex-partner Abigail Lyle. Yet n…
  continue reading
 
We are back and testing out a new episode format focusing more on discussion than summaries. We start talking a bit about the value of learning hacking by iterating on the same exploit and challenging yourself as a means of practicing the creative parts of exploitation. Then we dive into the recent Intel SGX fuse key leak, talk a bit about what it …
  continue reading
 
How do crime journalists talk to sources? And why are they given information and by who? Those are amongst the questions we tackle today in a Crime World special show, where you the listener, sets the agenda. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
In episode 346, we discuss new AI-driven voicemail scams that sound convincingly real and how to identify them. We also explore recent research on the privacy concerns surrounding donations to political parties through their websites. Additionally, we celebrate the 15th anniversary of the podcast and share some reflections and fun facts about the j…
  continue reading
 
Loading …

Quick Reference Guide