Best Black Software Developers podcasts we could find (Updated September 2019)
Related podcasts: Podcasting Education Society Audio Tech Conversations US Business Programming Software Development Software Hacking Security Podcasting Computer Spoken Word Tech News Best Practices Privacy Tech Tips Python Cyber  
Black Software Developers public [search 0]
×
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Podcast smarter! Player FM is free and easy.
show episodes
 
D
Darknet Diaries
Monthly
 
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are.
 
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices.
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
S
Smashing Security
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...Winner: "Best Security Podcast 2018" and "Best Security Podcast 2019."Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
Get in-depth coverage of security news and trends at WIRED. A SpokenEdition transforms written content into human-read audio you can listen to anywhere. It's perfect for times when you can’t read - while driving, at the gym, doing chores, etc. Find more at www.spokenedition.com
 
Linux in the Ham Shack Podcast in MP3 Format
 
R
Revision Path
Weekly
 
Revision Path is an award-winning design podcast that showcases the world's Black designers, developers, and digital creatives. On each episode, host Maurice Cherry explores the stories, processes, experiences, insights and inspirations of these awesome creators. Produced by Glitch, Inc.
 
Join Xojo Paul Lefebvre and Geoff Perlman as they talk about Xojo, technology and more.
 
The podcast about Python and the people who make it great
 
Application Security Weekly decrypts development for the Security Professional - exploring how to inject security into their organization’s Software Development Lifecycle (SDLC) in a fluid and transparent way; Learn the tools, techniques, and processes necessary to move at the speed of DevOps (even if you aren’t a DevOps shop yet). The target audience for Application Security Weekly spans the gamut of Security Engineers and Practitioners that need to level-up their skills in the Application ...
 
U
UMCOC Podcast
Monthly+
 
The UMCOC Podcast reports and discusses the week's Marvel Contest of Champions news and community affairs.UMCOC Podcast is not owned or affiliated with Kabam, Inc. or Marvel Entertainment, LLC.Marvel Contest of Champions software copyright © 2018 Kabam, Inc.Developed by Kabam.
 
Software Testing and related topics from Software Development Expert: Alan Richardson show notes at eviltester.com/show
 
S
Super Simple
Monthly
 
The Black Spectacles Super Simple Podcast explores the ‘how’ of architecture. How some of the most amazing projects in the world develop from a seed of an idea into a reality. It looks at the innovative ways in which architects are utilizing design software and technology to create incredible structures.Episodes include interviews with world-class architects who are pushing the boundaries of technology in design practice and creating amazing work. In each episode we will talk with an archite ...
 
B
Business Black Belt®
Monthly
 
I’m Burke Franklin, and after 35+ years in business helping new and established businesses raise capital and gain higher success, I wanted to engage others to share their insights as well. I hate it when good products, companies or people fail! Building a successful business and being a mindful and responsive entrepreneur is an emotional, mental, physical and spiritual bootcamp. Yet, few things are more rewarding and gratifying than succeeding with your own ideas and making a difference in t ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
 
Applications fuel innovation in the cloud and mobile era. Containers, and the ecosystem that is developing around them, will empower software developers to create the next generation of applications experiences, while IT Pros can use containers to provide standardized environments for their development, QA, and production teams, creating an infrastructure that is simpler to update and maintain. Interested in learning more? Check out the resources below!
 
S
Sound of Istanbul
Monthly
 
Even if you lived in Turkey or traveled to Turkey for vacation or business, I'm hoping this music will pleasantly surprise and entertain you. There is so much ethnic and social diversity in the world. Freedom, social justice and human rights aren’t enough to bring happiness to people. Every social or ethnic community has a need to love and be loved. What I say sounds like Bob Marley's ideas but it isn't all that different from the principles of Kemal Ataturk (founder of modern Turkey) or wor ...
 
Loading …
show series
 
A team of researchers have published a report titled, "KNOB Attack. Key Negotiation of Bluetooth Attack: Breaking Bluetooth Security." The report outlines vulnerabilities in the Bluetooth standard, along with mitigations to prevent them. Daniele Antonioli is from Singapore University of Technology and Design, and is one of the researchers study ...…
 
The Ukrainian electrical grid hack seems, on further review, to have been designed to do far more damage than it actually accomplished. InnfiRAT is scouting for access to cryptocurrency wallets. A sophisticated threat actor is using Simjacker for surveillance on phones in the Middle East. The SINET 16 have been announced. A penetration test goe ...…
 
Threatpost editors break down the biggest news stories of this week ended Sept. 13. That includes: Researchers warning that more than one billion mobile usersare at risk from a SIM card flaw being currently exploited by threat actors A Telnet backdoor opened more than 1 million Imperial Dabman IoT radiosto hijack Wikipedia and World of Warcraft ...…
 
DC StingRays alleged to be Israeli devices. North Korea is slipping malware past defenses by putting it into old, obscure file formats. Ryuk ransomware gets some spyware functionality. Google has purged Joker-infested apps from the Play store. The US Defense Department explains its “multifaceted” approach to cyber deterrence. The FBI warns that ...…
 
CircuitPython is a programming language designed to simplify experimenting and learning to code on low-cost microcontroller boards. The history of CircuitPython begins with MicroPython, a Python interpreter written from scratch for embedded systems by Damien George starting in 2013. Three years later, Adafruit hired Shawcroft to port MicroPytho ...…
 
Apple is furious with Google over iPhone hacking attacks against Uyghur Muslims in China, DNS-over-HTTPS is good for privacy but makes ISPs angry, and concern over digital assistants listening to our private moments continues to rise. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer s ...…
 
Apple is furious with Google over iPhone hacking attacks against Uyghur Muslims in China, DNS-over-HTTPS is good for privacy but makes ISPs angry, and concern over digital assistants listening to our private moments continues to rise. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer s ...…
 
Cobalt Dickens is back, and phishing in universities’ ponds. UNICEF scores a security own-goal. Patch Tuesday notes. A look at US election security offers bad news, but with some hope for improvement. The US extends its state of national emergency with respect to foreign meddling in elections. And an international police sweep draws in 281 alle ...…
 
Sherrod DeGrippo, the senior director of the threat research and detection team at Proofpoint, joins Threatpost editor Lindsey O'Donnell to swap stories about the craziest scams and phishing attempts that she's seen - and how hackers are playing into victims' emotions to get them to click on that malicious attachment or link.…
 
A very deep dive into iOS Exploit chains found in the wild followed by Heap Exploit Development, Twitter turns off SMS texting after @Jack hijacking, CVE-2019-15846: Unauthenticated Remote Command Execution Flaw Disclosed for Exim, 7 Steps to Web App Security, Fuzzing 101: Why Bug Hunters Still Love It After All These Years, and more! Full Show ...…
 
Opinion: There’s little data on the effectiveness of mental health reporting laws, and we’re being distracted from measures we know will save lives.
 
John Bolton is out as US National Security Advisor. A new backdoor is attributed to Stealth Falcon. Wikipedia’s DDoS attack remains under investigation. So does a business email compromise at Toyota Boshoku and a raid on the Oklahoma Law Enforcement Retirement Services. Vulnerable web radios get patches. The US is said to have exfiltrated a HUM ...…
 
This week on our show:Content Creator Preview of Black Widow (Claire Voyant)Can you read our minds? What did the Podcast think of this mystical dame?NEWS!1. Bug Logs for Android & IOSMid-Combo HeaviesLaggy Aarkus2. She-Hulk Compensation available Sept 183. Community's Choice Boss Rush 2 coming Sept 18And we can't talk about it.4. Beta Test: AQ ...…
 
Exposed Facebook phone numbers, an XKCD breach, and more of the week's top security news.
 
Ty Sbano is the Cloud Chief Information Security Officer of Sisense. Ty will be discussing Tools in the DevOps Pipeline, Component Analysis, and Anything Application Security! Full Show Notes: https://wiki.securityweekly.com/ASW_Episode75 Visit https://www.securityweekly.com/asw for all the latest episodes!…
 
Welcome to Episode 301 of Linux in the Ham Shack. In this episode, the hosts have an in-depth talk with Andy Taylor, MW0MWZ, the author and maintainer of the Pi-Star project. Pi-Star is a Linux operating system and application suite for single-board computers which creates a hotspot for digital VHF and UHF operation. We quickly discover this to ...…
 
Summary The internet has made it easier than ever to share information, but at the same time it has increased our ability to track that information. In order to ensure that news agencies are able to accept truly anonymous material submissions from whistelblowers, the Freedom of the Press foundation has supported the ongoing development and main ...…
 
A big BEC extracts more than $37 million from a major automotive parts supplier. Wikipedia suffers a DDoS attack in Europe and the Middle East. NERC and FERC get to work. Thrip may really be Billbug, and that’s attribution, not etymology. Was US Cyber Command trolling North Korea on the DPRK’s national day? And what does the Department of Motor ...…
 
How much do you factor accessibility into your work? If the answer isn't "a lot", then hopefully this week's interview with Erin Newby will give you some insight. Erin has recently struck out on her own, and she brings years of product design experience with her to help clients and companies provide the best experiences to their customers. Erin ...…
 
Researchers at McAfee's Advanced Threat Research Team recently published the results of their investigation into a popular VOIP system, where they discovered a well-know, decade-old vulnerability in open source software used on the platform. Steve Povolny serves as the Head of Advanced Threat Research at McAfee, and he joins us to share their f ...…
 
Chinese intelligence and security services have been busy in cyberspace. A third-party customer leaks data it received from Monster.com. There’s a Joker in the Play Store. Some notes from the Billington CyberSecurity Summit: a military look at cyber ops, what CISA’s up to, and some advice from the NCSC. Anti-trust investigations are on the way ...…
 
In this week's news wrap ended Sept. 6, the Threatpost team breaks down the biggest news of the week, including: Cybercrooks successfully fooling a company into a large wire transfer using an AI-powered deepfakeof a chief executive's voice (and Facebook, Microsoft and a number of universities joining forces to sponsor a contestpromoting researc ...…
 
It's time once again for The Weekender. This is our bi-weekly departure into the world of amateur radio contests, open source conventions, special events, listener challenges, hedonism and just plain fun. Thanks for listening and, if you happen to get a chance, feel free to call us or e-mail and send us some feedback. Tell us how we're doing. W ...…
 
Welcome to the 700th episode of Hanselminutes! Doing this many episodes wouldn't be possible without the support of my Wife Mo, so she's my guest on this special episode! We're in a mixed marriage - she's not a computer person - so we'll talk about how we get along and how we've done it for 20 years! https://www.hanselminutes.com/567/the-return ...…
 
Join Paul as he talks with Anthony Cyphers of GraffitiSuite, which won the 2019 Xojo Design Award for Best Developer Tool. Download mp3 Topics GraffitiSuite Anthony on Twitter (@GraffitiSuite) Migrating from Visual Basic 2019 Xojo Design Award Winners Dark Mode Support XOJO.CONNECT 2020 The ExpanseBy Xojo.
 
A database scraped from Facebook in the bad old days before last year’s reforms holds informaiton about 419 million users. The ransomware threat to election security. Notes from the Billington CyberSecurity Summit. Is your phone reporting back to Mountain View or Cupertino? Probably not, at least not in the way the Twitterverse would have you b ...…
 
Should Google really be helping the FBI with a bank robbery? What's the story behind the Twitter CEO claiming there's a bomb in their offices? And how much does your car really know about you? And we mourn the loss of Doctor Who legend Terrance Dicks... All this and much much more is discussed in the latest edition of the "Smashing Security" po ...…
 
Should Google really be helping the FBI with a bank robbery? What's the story behind the Twitter CEO claiming there's a bomb in their offices? And how much does your car really know about you? And we mourn the loss of Doctor Who legend Terrance Dicks... All this and much much more is discussed in the latest edition of the "Smashing Security" po ...…
 
A look at the ongoing ransomware epidemic, with some speculation about its connection to the criminal economy. Over-the-air provisioning might open Android users to sophisticated phishing approaches. Alleged spammers are indicted in California. And, ZAO, we hardly knew ye. Jonathan Katz from UMD on the evolution of Rowhammer attacks. Tamika Smi ...…
 
A report on Stuxnet suggests there were at least five and probably six countries whose intelligence services cooperated in the disabling cyberattack against Iran’s nuclear enrichment program. The watering hole Project Zero reported last week seems to have affected Android and Windows as well as iOS devices, and appears directed against China’s ...…
 
#91: The Kree Have Lost Their Marbles, Higher, Further, Faster Captain Sparkles by UMCOC Podcast NetworkBy UMCOC Podcast Network.
 
Hello and welcome to the 299th episode of Linux in the Ham Shack! In this episode, the hosts discuss ARES and Hurricane Dorian, keeping 2m frequencies in France, Icom's new foray into QRP radio, Google in open source, fldigi, WINE and much more. Thank you for listening and we hope you have a fantastic week. 73 de The LHS Crew…
 
This is the story about the XBox hacking scene and how a group of guys pushed their luck a little too far. This is part 2 of a 2 part series. Sponsors This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. Learn more about stocks and investing from MyWallSt. Visit mywallst.com/darknet to learn more. ...…
 
Summary The ecosystem of tools and libraries in Python for data manipulation and analytics is truly impressive, and continues to grow. There are, however, gaps in their utility that can be filled by the capabilities of a data warehouse. In this episode Robert Hodges discusses how the PyData suite of tools can be paired with a data warehouse for ...…
 
While many technology companies these days have developer advocates, it may not be immediately clear to the rest of us exactly what it is they do. Advocating for developers at a tech company should be easy, right? Well, there's more to it then what the title suggests, and I'm extremely glad this week to talk with Brian Douglas to learn more. As ...…
 
The Emotet malware came on the scene in 2014 as a banking trojan and has since evolved in sophistication and shifted its business model. Researchers at Bromium have taken a detailed look at Emotet, and malware analyst Alex Holland joins us to share their findings. The research can be found here: https://www.google.com/url?q=https://www.bromium. ...…
 
Google’s Project Zero releases information on a long-running watering-hole campaign against iPhone users. A dental record backup service is hit by ransomware, and the decryptor the extortionists gave them may not work. Huawei may be in fresh legal hot water over alleged IP theft. Cryptojacking charges are added to those the accused Capital One ...…
 
In this week's news wrap podcast, editor Lindsey O'Donnell and Tara Seals break down the top news of the week - from ransomware attacks to companies responding to outcry over privacy issues. Top stories include: Ring announcedit is working with more than 400 US police departments to streamline their access to user videos, ushering fears over pr ...…
 
Senior US officials say the June 20th attacks on Iranian networks helped stop Tehran’s attacks on tankers in the Arabian Gulf. TrickBot seems to be going after mobile users’ PINs. Fancy Bear has taken note of machine learning and modified her behavior accordingly. Facebook revises its rules to achieve greater transparency in political and issue ...…
 
Cheryl Contee is the award-winning CEO of the digital agency Do Big Things. She's the cofounder of Attentive.ly, the first tech startup with a black female founder to be acquired by a NASDAQ company, and she's the national board chair for Netroots Nation. She talks to Scott about her new book, Mechnical Bull: How you can achieve Startup Success ...…
 
Was a cybercrime committed on the International Space Station? What on earth were Ukrainian scientists thinking when they plugged a nuclear power station into the internet? And someone has cloned Canadian clinical psychologist Jordan Peterson's voice... All this and much much more is discussed in the latest edition of the "Smashing Security" po ...…
 
Was a cybercrime committed on the International Space Station? What on earth were Ukrainian scientists thinking when they plugged a nuclear power station into the internet? And someone has cloned Canadian clinical psychologist Jordan Peterson's voice... All this and much much more is discussed in the latest edition of the "Smashing Security" po ...…
 
LYCEUM is active against the oil and gas sector in the Middle East. Leaving government service? That nice offer from the head-hunters you got on LinkedIn may be the beginning of an approach by Chinese Intelligence. Autonomous car expert indicted for alleged theft of trade secrets. Imperva discloses a possible breach. Exploitation attempts again ...…
 
We interview Azi Cohen the Co-founder of WhiteSource. He will be talking about Application security has undergone a transition in recent years, as information security teams testing products before release became irrelevant, developers started playing a leading role in the day-to-day operational responsibility for application security. We then ...…
 
Hostinger resets passwords after a breach. Arkose finds that more than half the social media logins they investigated during the recent quarter were fraudulent. US State governors seem likely to call on the National Guard to help with cyber incidents. A new phishing campaign is distributing the Quasar RAT. A new ransomware strain, Nemty, is out ...…
 
Arbitrarium guest stars!This week on our show:1. 80 Years of Marvelhttps://playcontestofchampions.com/80-years-of-marvel-comics/Three events: Amazing Fantasy, Time After Time, Boss Rush Community's Choice #2Vision (Aarkus) & Black Widow (Claire Voyant)2. Early Email Release3. Symbiote Supreme description update. No ability modifications. Not a ...…
 
The paper being presented suggested that the two researchers had a method to quickly find large semiprime numbers and essentially break RSA-2048 and any other semiprime-based encryption.
 
Hello and welcome to the 298th installment of Linux in the Ham Shack. In this episode, we take a close look at getting Scouts on the air with the JOTA and JOTI programs. It's a great way to get involved in amateur radio, whether or not you're into Scouting. Also, we address a bunch of feedback that's been queuing up over the last few weeks. Lot ...…
 
Pawan Shankar is the Senior Product Marketing Manager of Sysdig. Sysdig is very excited to announce the launch of Sysdig Secure 2.4! With this release, Sysdig adds runtime profiling to enhance anomaly detection and introduces brand new interfaces that improve runtime security policy creation and vulnerability reporting. To learn more about Sysd ...…
 
BioWatch info exposed. Patched vulnerabilities are weaponized in the wild. Romance and other scam indictments name eighty defendants. Cryptomining and data exposure. Social engineering with a sheen of multi-factor authentication. Suing the boo birds and the people who let them in. The road to unhappiness is paved with mutually exclusive good in ...…
 
Google login Twitter login Classic login