Tales of supernatural horror and suspense, old and new, are brought to life in this series of audio narrations enhanced with spinetingling music and sound effects. Featuring stories by acknowledged masters of the genre like M. R. James, E. F. Benson and H. P. Lovecraft, alongside lesser-known authors of the early 20th century waiting to be rediscovered and contemporary talents, The EnCrypted Horror Podcast is your new home for horror, curated, read and produced by Jasper L'Estrange. Subscrib ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
The world’s most controversial events, and the complex beliefs behind them. From Bigfoot sightings to bitcoin takeovers, alien landings to assassinations, who’s shaping the narrative — and why? Conspiracy Theories is a Spotify Podcast. New episodes Wednesdays. Watch episodes and more on YouTube: www.youtube.com/@ConspiracyTheoriesPodcast
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
Scramblex.com has released a free encryption service that will protect sensitive data from unauthorised access and the potential for identity or financial theft.
…
continue reading
Exploring the ideas and stories of crypto moguls from around the world. Learn more at cryptonews.com
…
continue reading
Techlore Talks brings you in-depth conversations with the experts at the forefront of privacy, security, and digital rights. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode features meaningful discussions with the people building, researching, and advocating for digital freedom. From cybersecurity researchers and privacy tool developers to open-source advocates and digital rights activists—if they're shaping how we protect ourselves online, the ...
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
…
continue reading
1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
…
continue reading
The officially unofficial podcast for Mr. Robot on USA. Each week we hack into the episode with a full recap and listener feedback.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Venture into the elusive world of intelligence collection and espionage to spot, assess and debrief: spies, handlers, catchers, analysts, cut-outs, dangles, diplomats, security experts and the storytellers who bring them all to life. Check your electronics and subscribe, do a thorough surveillance detection route, secure your Live Drop location, and after a mad-minute introduction, listen in on conversations with our fascinating guests who help to illuminate a complex universe. A HUMINT expe ...
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
A new beginning in IT
…
continue reading
Interviews with users, hackers, and staff of America Online (AOL), covering the 90’s/Early 2000’s.
…
continue reading
Discover the future of digital privacy with ZeroID — featuring a secure chat app, secure eSIM, and encrypted eSIM technology with no KYC or surveillance. Learn how to stay anonymous, connected, and in control using crypto-powered tools built on Solana.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
A series of shortcasts from the Internet Watch Foundation (IWF) about their leading non-profit work tackling online child sexual abuse. Our series of short podcasts feature discussions with leading experts and academics covering a wide variety of topics including tech, encryption, policy and how these impact the criminal circulation of child sexual imagery online. Find out more at iwf.org.uk
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Current content form the PC World Magazine
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
David Bombal interviews people in the networking world to learn about life, hacks, technology and networking and ways to improve your life!
…
continue reading
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Microsoft confirms bug with encrypted emails in classic Outlook app.
…
continue reading
Asked whether he’s ever experienced the sensation of “the other man on the rope”, seasoned mountaineer Sir Andrew Poursuivant regales his companion Bill with a story of a harrowing ascent up the Dent du Géant…a climb that has haunted him ever since.This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE THIR…
…
continue reading
Get this 4-pack of AirTag alternative trackers for $5 a piece.
…
continue reading
TikTok-style vertical videos are coming to Disney+.
…
continue reading
No fans.
…
continue reading
Best of CES 2026: The smart home & home security gear edition.
…
continue reading
Microsoft Edge is getting a Copilot-style makeover, even if you dont use AI.
…
continue reading
The official launch date for Windows 11 26H1, confirmed.
…
continue reading
This 16-inch 2K portable laptop monitor is worth it at 30% off.
…
continue reading
Bose goes open source with its aging SoundTouch speakers.
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/wrapping-up-trends-in-macos-malware-of-2025. The myth of a malware-free Mac is a thing of the past. Here’s how Mac threats evolved in 2025 — and what’s coming next. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check e…
…
continue reading
1
I Saw a Phishing Site That Traps Security Bots
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26This story was originally published on HackerNoon at: https://hackernoon.com/i-saw-a-phishing-site-that-traps-security-bots. How modern phishing kits use honeypots, cloaking, and adversary-in-the-middle attacks—and how defenders can turn those same tactics against them. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybers…
…
continue reading
Score 2 super-fast USB-C charging cables for just $9 right now.
…
continue reading
AMD claps back at Intel claims that it uses ancient silicon in PC gaming handhelds.
…
continue reading
Save $451 on this Asus gaming laptop with Ryzen 9 and RTX 5070 today.
…
continue reading
Googles Gmail just got a big AI upgrade and its (mostly) free.
…
continue reading
TP-Links Tapo family gains 3 high-resolution security cameras.
…
continue reading
CES debuts a HyperX-branded gaming headset that you can control with your brain.
…
continue reading
Transfer to your new PC the lazy way this $34.99 bundle does all the work.
…
continue reading
Nvidia, AMD consider reviving old chips to combat soaring PC costs.
…
continue reading
Best of CES 2026: The tech gear and PC innovations that blew us away.
…
continue reading
Seeing means believing for Nvidias new DLSS 4.5 and G-Sync Pulsar monitors.
…
continue reading
1
#507: Carlos Lei, CEO of Uplink, on The Future of Connectivity, Mesh Networks, Building on Avalanche, and DePIN in 2026
27:34
27:34
Play later
Play later
Lists
Like
Liked
27:34Carlos Lei, CEO of Uplink, one of the leading DePIN players, operates as a connectivity marketplace using existing Wi-Fi routers to help telecom companies save millions of dollars. In this conversation, we discuss: - 2026 will be the year of DePIN - Insights from building in connectivity since 2015 - The future of connectivity - Mesh networks - Sha…
…
continue reading
1
SANS Stormcast Thursday, January 8th, 2026: HTML QR Code Phishing; n8n vulnerability; Powerbank Feature Creep
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23A phishing campaign with QR codes rendered using an HTML table Phishing emails are bypassing filters by encoding QR codes as HTML tables. https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table/32606 n8n vulnerabilities In recent days, several new n8n vulnerabilities were disclosed. Ensure that …
…
continue reading
Jaguar Land Rover reveals the fiscal results of last year’s cyberattack. A Texas gas station chain suffers a data spill. Taiwan tracks China’s energy-sector attacks. Google and Veeam push patches. Threat actors target obsolete D-Link routers. Sedgwick Government Solutions confirms a data breach. The U.S. Cyber Trust Mark faces an uncertain future. …
…
continue reading
iGarden debuts wire-free robot lawn mowers with all-terrain nav at CES.
…
continue reading
iGarden brings four new M1-series robotic pool cleaners to CES.
…
continue reading
AMD hints you could buy a mobile Ryzen and drop it into a desktop PC.
…
continue reading
FinWhale keeps tabs on pool chlorineand corrects it as needed.
…
continue reading
Watch: We opened up Lenovos uber-repairable ThinkPad at CES 2026.
…
continue reading
In this episode, KJ announces the reimagined CDW Canada Tech Talks, outlining what’s ahead for 2026. You can expect more frequent episodes, new expert hosts and a broader range of topics, including AI, cybersecurity, cloud management and public sector innovation. Our mission remains clear: deliver timely insights and practical advice to help IT lea…
…
continue reading
If you have a Samsung SSD, you better update this app ASAP.
…
continue reading
Grab Inius 20K pocket-sized power bank with built-in cable for 22% off.
…
continue reading
Best VPN services: 8 top picks for every VPN need.
…
continue reading
Chrome fixes a problematic security flaw in first update of 2026.
…
continue reading
Windows 11s Phone Link now lets Android apps run almost full-screen.
…
continue reading
Now 31% off!
…
continue reading
1
The Authorization Gap No One Wants to Talk About: Why Your API Is Probably Leaking Right Now
11:41
11:41
Play later
Play later
Lists
Like
Liked
11:41This story was originally published on HackerNoon at: https://hackernoon.com/the-authorization-gap-no-one-wants-to-talk-about-why-your-api-is-probably-leaking-right-now. Broken Object Level Authorization (BOLA) is eating the API economy from the inside out. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You …
…
continue reading
1
IPv6 and CTV: The Measurement Challenge From the Fastest-Growing Ad Channel
13:34
13:34
Play later
Play later
Lists
Like
Liked
13:34This story was originally published on HackerNoon at: https://hackernoon.com/ipv6-and-ctv-the-measurement-challenge-from-the-fastest-growing-ad-channel. IPv6 breaks digital ad measurement. Learn how IPinfo’s research-driven, active-measurement model restores accuracy across CTV and all channels. Check more stories related to cybersecurity at: https…
…
continue reading
Get Razers Viper V3 Pro wireless esports mouse for 31% off today.
…
continue reading
This Ryzen 9 mini PC with 32GB RAM is on sale for $450 right now.
…
continue reading
Two of Ikeas most eye-catching lights are about to get smart.
…
continue reading
Philips Hue debuts SpatialAware for smarter, position-based lighting.
…
continue reading
The 10 best laptops at CES 2026.
…
continue reading
Consolidate your AI apps into one platform built for creators and businesses now a flat $59.99.
…
continue reading
Excel tip: Define cell names to cut errors and speed up your formulas.
…
continue reading
UGREEN redefines NAS with secure, on-device AI in the NASync iDX Series.
…
continue reading
7 essential tips to maximize AI security.
…
continue reading
Corsair announces Steam Deck-integrated keyboard and new gaming mice.
…
continue reading