Best Malware podcasts we could find (Updated December 2018)
Related podcasts: Security Cybersecurity Technology Tech Infosec Cyber Informationsecurity Hacking Privacy Software Development Threat Web Business News Education Ransomware Computersecurity Regulatory Pentesting Owasp  
Malware public [search 0]
×
Join millions of Player FM users today to get Malware news and insights whenever you like, even when you're offline. Podcast smarter with the podcast app that refuses to compromise … it's free and easy.
Podcast smarter! Player FM is free and easy.
show episodes
 
The TechGenix podcast series explores everything information technology. We love to talk about the industry, what it means to be working in IT, and all the absurd and hilarious situations we encountered in our professional careers. Of course, prepare for a lot of hardcore tech stuff too, including servers, virtualization, cloud computing, cybersecurity, and more. If you are an IT professional or want to become one, this is the right place for you.Our currently running shows include:// The T- ...
 
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
 
Brian Boettcher and Michael Gough discuss all things in Incident Response, Malware, Threat Hunting, and securing systems from the hazards bad actors can use to ruin a Blue Team's day...
 
Get in-depth coverage of security news and trends at WIRED. A SpokenEdition transforms written content into human-read audio you can listen to anywhere. It's perfect for times when you can’t read - while driving, at the gym, doing chores, etc. Find more at www.spokenedition.com
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
S
Smashing Security
Weekly
 
Join computer security industry veterans Graham Cluley and Carole Theriault as they have a light-hearted chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...Winner: "Best Security Podcast 2018."Follow the podcast on Twitter at @SmashinSecurity. New episodes released every Thursday. Bonus "splinter" episodes when we feel like it...
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
Join the Intego Mac security experts for the latest Apple news, industry opinions, and a splash of security advice in our easy-to-digest, entertaining, and informative podcast series.Hosted by Kirk McElhearn and Josh Long.
 
T
Threat Wire
Monthly+
 
Threat Wire by Hak5 is a quick weekly dose of news about security, privacy, and what is threatening the freedom of our Internet.
 
I
InfoSec ICU
Weekly
 
The Health Information Security podcast from the Medical University of South Carolina
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
 
S
Sophos Podcasts
Monthly
 
Podcast by SophosLabs
 
Tips from pros on how to they got hired in the Information Security field.Listen for an "Easter Egg" in each show!100% Ad FreeThe personal project does not have any affiliation with my employer.
 
Listen to weekly round up of interesting cyber security stories from across the globe. Each podcast delves deeper into a particular story revealing insights and the often unheard story to listeners. The show is hosted by Mansi Kapur, business journalist with Fortune and Jose Varghese, cyber security entrepreneur and geek with Paladion.
 
T
Tech News Today
Daily
 
One trusted name gives you the tech news you need to stay up-to-date. Listen to Kim Komando and be informed every day. Knowledge is power.
 
Cybersecurity Managed features up to date insights and analysis by the Fortify 24x7 security professionals on the most important cybersecurity issues affecting your life today. Since the world of cyber security can be extremely complicated, Cybersecurity Managed explains highly technical subject matter in non-technical terms in order to educate local businesses and listeners. We cover a range topics that are of vital interest to the cybersecurity professional and will also appeal to the novi ...
 
T
This Week in Mobile
Monthly+
 
Atherton Research Principal Analyst Jean Baptiste Su brings you up to speed on all the top mobile news stories of the past 7 days
 
S
State of the Hack
Monthly
 
State of the Hack is FireEye’s monthly series, hosted by Christopher Glyer (@cglyer) and Nick Carr (@itsreallynick), that discusses the latest in information security, digital forensics, incident response, cyber espionage, APT attack trends, and tales from the front lines of significant targeted intrusions.
 
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
 
K
Kevin Hilley
Weekly+
 
Morning radio personality Kevin Hilley talks pop culture, tv, movies, sports, entertainment, news and life in general.
 
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
 
S
Salted Hash
Weekly
 
Security writer Steve Ragan talks with experts about the latest in cybersecurity, ransomware, malware, hacking and more. Stay informed, minimize risk and protect your organization. Catch new episodes weekly.
 
H
Hackable?
Monthly
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are.Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
Exclusive, insightful audio interviews by our staff with creditunion/security leading practitioners and thought-leaders. Transcripts are also available on our site!
 
Join your hosts Gardiner "The Linux Gamer" Bryant and Raven67854 as we go beyond they headlines in the tech, open source, and gaming world.
 
Penetration testing for Fortune 50 companies since 2008
 
Penetration testing for Fortune 50 companies since 2008
 
LeetSpeak with Alissa Knight, bridging the gap between all things information security. We’ll talk about the latest threats, vulnerabilities, security conferences, malware and exploits, as well as interview CIOs and CISOs from around the world about information security topics that matter most. Alissa Knight, one woman, one mission, one voice
 
C
Cybersecurity Sense
Monthly+
 
CyberSecurity Sense is LBMC Information Security's weekly podcast that will provide insight and updates on such information security topics as: Managed Security Service Providers, IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certificatio ...
 
Vic and Dub form the Voice of Reason and we discuss all things from gaming to movies all the way to politics
 
Your daily business news, brought to you by Slate. Hear more Slate articles at Slate.com/Voice. Want to hear a daily selection of the magazine’s best stories? Learn more at slate.com/voice A SpokenEdition transforms written content into human-read audio you can listen to anywhere. It's perfect for times when you can't read - while driving, at the gym, doing chores, etc. Find more at www.spokenedition.com
 
Stay up-to-date with what’s happening in the digital world the easy way! Digital expert, national radio host and USA Today columnist Kim Komando wastes no time and gets right to the top stories, scams, security alerts, product reviews and crazy happenings in the world of tech. Listen and you’ll be in the know with Kim Komando!
 
Exploring how two K12 network administrators use technology in their schools.
 
C
CSIAC Podcast
Daily+
 
CSIAC's MissionMission StatementCSIAC is chartered to leverage the best practices and expertise from government, industry, and academia in order to promote technology domain awareness and solve the most critically challenging scientific and technical problems in the following areas: Cybersecurity and Information Assurance, Software Engineering, Modeling and Simulation, and Knowledge Management/Information Sharing.
 
The home of the Security Bloggers Network
 
e
echarny on Narro
Daily
 
echarny uses Narro to create a podcast of articles transcribed to audio.
 
B
Baked and Awake
Monthly+
 
Baked and Awake is a Podcast about Cannabis, "Conspiracies", and You.. Join Host Steve Cominski for regular explorations of responsible and educated adult cannabis use, tips on working with the plant itself and enjoying your weed more than you ever thought you could. We also love to explore wide ranging topics from the philosophical, occult, and paranormal for a start. History, Politics, and Modern Technology inform the conversations at all times, as do our listeners. Tell us what you want t ...
 
T
The View Up Here
Weekly
 
Let's talk about Canadian politics. Not the spin, not the talking points, not the partisan bluster. Let's talk about the reality of this "democracy"
 
AT&T ThreatTraq is a roundtable discussion of current cyber security trends, observations, and recommendations from AT&T Security's Malware team. The full video of each discussion is available from the AT&T Tech Channel at http://techchannel.att.com/attthreattraq
 
E
Enlighten Up
Weekly
 
Are you looking for a refreshing spin on Spirituality? enLIGHTenUP is an unconventional podcast of four friends and guests sharing informative, fun and sometimes off-the-wall conversations about spiritual topics ranging from Ascension Symptoms, The Event, UFO’s, The Matrix, Astral Travel, Self-Healing, Extraterrestrials, Light Language, Kundalini Awakening, Akashic Records, God, and so much more! Unlike other podcasts, we provide fringe and skeptical viewpoints on all topics. Regardless of w ...
 
Loose Leaf Security is a podcast about making good computer security practice for everyone. We believe you don't need to be a software engineer or security professional to understand how to keep your devices and data safe. In every episode, we tackle a typical security concern or walk you through a recent incident.
 
Loading …
show series
 
There are now more than 1 million drones registered in the US. They are fun to fly, and poised to take on important commercial and public functions. But are they secure? Do pilots risk losing all control? For more info hackablepodcast.com Leave a rating or review in Apple Podcasts so we know what you think.…
 
Watch this episode on our YouTube channel! This is your Shared Security Weekly Blaze for December 17th 2018 with your host, Tom Eston. In this week’s episode: Equifax data breach details released, more Google+ API bugs and Supermicro strikes back. Silent Pocket is a proud sponsor of the Shared Security Podcast! Silent Pocket offers a patented R ...…
 
For the present, I’m not working in the security industry, so I shan’t be maintaining this blog, though I’ll keep it intact for the present in case people still find some use for what’s here. I don’t plan to look for another security job at present, but never say never: this site might just surprise […] The post Normal service suspended indefin ...…
 
Researchers at Risk Based Security took a detailed look back at the 2014 Sony hack, comparing analysis that occurred while the facts were still unfolding with what we know, today. There are interesting lessons to be learned, especially when it comes to attribution. Brian Martin is V.P. of vulnerability intelligence at Risk Based Security, and h ...…
 
Researchers at Risk Based Security took a detailed look back at the 2014 Sony hack, comparing analysis that occurred while the facts were still unfolding with what we know, today. There are interesting lessons to be learned, especially when it comes to attribution. Brian Martin is V.P. of vulnerability intelligence at Risk Based Security, and h ...…
 
Feral bringsDirt 4 is Linux, Facebook announces a bug that exposed millions of people's private data, and Australia passes legislation that may to weaken encryption and harm privacy globally! https://forum.heavyelement.io/d/113By gardiner@offtopical.net (Gardiner Bryant).
 
In offices and universities all across the country Thursday, the same threat appeared in email inboxes: Pay $20,000 worth of bitcoin, or a bomb will detonate in your building. Police departments sent out alerts. Workers from Los Angeles to Raleigh, North Carolina, evacuated their cubicles in the middle of the day. All over Twitter, people poste ...…
 
In today’s podcast, we hear about false flag cyberattacks that mimic state actors, especially Chinese state actors. Chinese intelligence services are prospecting US Navy contractors. Russia’s Fancy Bear continues its worldwide phishing campaign. ISIS claims the career criminal responsible for the Strasbourg Christmas market killings as one of i ...…
 
In today’s podcast, we hear about false flag cyberattacks that mimic state actors, especially Chinese state actors. Chinese intelligence services are prospecting US Navy contractors. Russia’s Fancy Bear continues its worldwide phishing campaign. ISIS claims the career criminal responsible for the Strasbourg Christmas market killings as one of i ...…
 
Recorded 12/7/18 - Several of us are under the weather, but the show must go on. We did our best, as always. After running through some recent research, we spend a good bit of this EP looking through the lens of a recent breach at the first things a new security leader should get a handle on - what questions need to be answered? What informatio ...…
 
Recorded 12/7/18 - Several of us are under the weather, but the show must go on. We did our best, as always. After running through some recent research, we spend a good bit of this EP looking through the lens of a recent breach at the first things a new security leader should get a handle on - what questions need to be answered? What informatio ...…
 
Methods for managing YouTube for G-Suite users. Reach out to us: @feekes | @twistofmatt | @educatingtech Join Our Discord Become a Patron Patreon Links and Show Notes Super Micro says independent audit found no spy chips - 9to5Mac Chrome Extensions are coming to Microsoft’s new Edge browser - The Verge Your content & Restricted Mode - YouTube H ...…
 
Netflix is working on a new feature that you might love. You won't believe which song is now the most-streamed. If you live in California, you might soon be taxed for sending text messages. Amazon has some great news for all you last minute Christmas shoppers. Apple is building a new campus in Austin, TX. All that and more in Tech News This Wee ...…
 
Ohio State University students can now vend the greatest food in human history. #bacon #OSU #college #food #OhioPorkCouncil #pork #health #news #funny
 
This episode focuses on topics introduced by the following TechGenix articles:- Is there a right to disconnect? Should there be?- So much for ‘predictable expenses’: Is Office 365 busting your budget?- How experimentation can lead to improved user experience
 
This has not been Facebook's proudest year for privacy and security. The company faced the massive Cambridge Analytica data misuse and abuse scandal in April and beyond. It also disclosed its first data breach in October, which compromised information from 30 million accounts. But Facebook has at least one security-focused bright spot it can po ...…
 
There's a lot of security news this week, and we look at how facial recognition has been used at concerts, and at doorbells, a security vulnerability in software for headsets, and the most popular passwords of the year. Then we discuss the best way to set up a new Mac. Expediting changes to Google+ Taylor Swift used facial recognition software ...…
 
Today's podcast covers a new phishing lure that tries to capture passwords, another bad Mac app discovered and interesting reports from government committees in Canada and the U.S.
 
Hackers are infecting government agencies around the world with malware. You won't believe the horrible passwords people are still using. Virgin Galactic just took a huge leap into space. Samsung's website is open to hackers. Hi-tech doorbells are getting swiped off people's houses. An amazing robot turns out to be a fake. Taylor Swift is using ...…
 
The latest edition of the ISMG Security Report features an analysis of the validity of reports that China is behind the massive Marriott data breach. Also: Fascinating details in a Congressional report on the Equifax breach, and a clear explanation of "self-sovereign identity."
 
The latest edition of the ISMG Security Report features an analysis of the validity of reports that China is behind the massive Marriott data breach. Also: Fascinating details in a Congressional report on the Equifax breach, and a clear explanation of "self-sovereign identity."
 
The latest edition of the ISMG Security Report features an analysis of the validity of reports that China is behind the massive Marriott data breach. Also: Fascinating details in a Congressional report on the Equifax breach, and a clear explanation of "self-sovereign identity."
 
The latest edition of the ISMG Security Report features an analysis of the validity of reports that China is behind the massive Marriott data breach. Also: Fascinating details in a Congressional report on the Equifax breach, and a clear explanation of "self-sovereign identity."
 
From the fancy new USB-C or Thunderbolt ports on your laptop to the software and settings that came with your operating system, there are a lot of potential security concerns with recent computers. Liz and Geoffrey finish up their series on desktop and laptop security by looking at some of the latest threats - and why computers with old-style U ...…
 
In today’s podcast we hear that the Saipem hack looks like a new Shamoon variant. Charming Kitten started prowling through relevant places after the Iran sanctions became more serious. US authorities denounce Chinese espionage, especially industrial espionage, but there are as yet no new indictments or sanctions. Concerns mount over Chinese inf ...…
 
In today’s podcast we hear that the Saipem hack looks like a new Shamoon variant. Charming Kitten started prowling through relevant places after the Iran sanctions became more serious. US authorities denounce Chinese espionage, especially industrial espionage, but there are as yet no new indictments or sanctions. Concerns mount over Chinese inf ...…
 
12/13/18 WordPress Botnet; OpenSSH Backdoors; Password Reset; Internet Weather | AT&T ThreatTraq (Security for Security Pros)
 
In this Naked Security podcast, Anna Brading, Paul Ducklin and Mark Stockley confront the latest cybersecurity threats affecting WordPress, Android and Flash.https://nakedsecurity.sophos.com/massive-botnet-chews-throughhttps://nakedsecurity.sophos.com/android-click-fraud-appshttps://nakedsecurity.sophos.com/flash-zero-day-exploit-spottedMusic b ...…
 
The massive data breach that affected 500 million Marriott customers feels like a recent event, given that the company just discovered and disclosed it over the last four months. But it's important to remember that the attack began much earlier, especially as Reuters and others have reported that state-sponsored Chinese hackers were behind it. ...…
 
Another malicious Android app has been caught ripping people off. Apple is working on a news subscription service. You won't believe who’s responsible for the latest Marriott data breach. Microsoft is tracking your activity through Windows 10, even when it's not supposed to. NASA just made another amazing discovery. You'll never guess the most ...…
 
Eric Raines is back to share his wisdom and expertise with all of at enLIGHTenUP! He has an incredible way of explaining complex healing modes in a digestible manner that makes application seamless. And today we are going to delve into many topics of energetic and physical healing starting with Gene Cutters. Who are Gene Cutters and how are the ...…
 
The First Ministers Conference. A wonderfully Canadian creation where Provincial and Territorial Premiers try to use their 13-to-1 advantage to extort/persuade/embarrass/browbeat the Federal government into delivering on aims not necessarily in the "national interest" despite all claims to the contrary. There is no real purpose to these gatheri ...…
 
The curious case of George Duke-Cohan, Huawei's CFO finds herself in hot water, and the crazy world of mobile phone mental health apps. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guests Mikko Hyppö ...…
 
The curious case of George Duke-Cohan, Huawei's CFO finds herself in hot water, and the crazy world of mobile phone mental health apps. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guests Mikko Hyppö ...…
 
The curious case of George Duke-Cohan, Huawei's CFO finds herself in hot water, and the crazy world of mobile phone mental health apps. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guests Mikko Hyppö ...…
 
In today’s podcast, we hear some of McAfee’s description of Operation Sharpshooter, an ambitious cyber reconnaissance campaign. Huawei’s CFO Meng makes bail in Vancouver, and China reacts sharply to the arrest. The US is said to be preparing sanctions and indictments in response to various Chinese hacking activities. A no-confidence vote is cal ...…
 
In today’s podcast, we hear some of McAfee’s description of Operation Sharpshooter, an ambitious cyber reconnaissance campaign. Huawei’s CFO Meng makes bail in Vancouver, and China reacts sharply to the arrest. The US is said to be preparing sanctions and indictments in response to various Chinese hacking activities. A no-confidence vote is cal ...…
 
BAKED AND AWAKE Episode 64 December 11th 2018 The Mud Flood Event and Grand Tartaria / Great Tartary Dark Myths Bumper PBL Spotlight Promo- Song Appeal Library of Alexandria sound bite Greeting, Welcome, Disclaimer- we smoke weed. Identify Dark Myths, DGN, the PBL The Baked and Awake Newsbrief and where to find it Email talktous@bakedandawake.c ...…
 
Gerry and Brandon are back in the studio discussing the Marriott Starwood breach. Steve interviews an RFID/NFC bio-hacked individual, and Gerry and Brandon discuss the ramifications and privacy legislation around RFID for personal identification. Show Notes Resources: Marriott / Starwood Breach https://www.washingtonpost.com/business/2018/11/30 ...…
 
Today's podcast covers a ransomware author who isn't giving victims the opportunity to pay to get their data back, a new malware campaign attacking home and small busienss routes and a warning to say away from piracted Mac software
 
A massive data leak is forcing Google to shut down its social networking service early. Facebook wants to predict where you are going at all times. Scammers have come up with a new way to rip off senior citizens. Amazon's Alexa is adding helpful location-based reminders and routines. Parents are concerned about children and their addiction to F ...…
 
We are deep into the worst case scenarios. But as new sentencing memos for Trump associates Paul Manafort and Michael Cohen make all too clear, the only remaining question is how bad does the actual worst case scenario get? The potential innocent explanations for Donald Trump’s behavior over the last two years have been steadily stripped away, ...…
 
Audit finds no “Chinese spy chips” on Supermicro motherboards. Huawei CFO Meng’s hearing continues. Oil services firm’s servers attacked. Seedworm shows some new tricks. Secure instant messaging apps may be less secure than hoped. A new adware strain reported. Mr. Pichai goes to Washington, and Uncle Pennybags puts in an appearance. The US Hous ...…
 
Audit finds no “Chinese spy chips” on Supermicro motherboards. Huawei CFO Meng’s hearing continues. Oil services firm’s servers attacked. Seedworm shows some new tricks. Secure instant messaging apps may be less secure than hoped. A new adware strain reported. Mr. Pichai goes to Washington, and Uncle Pennybags puts in an appearance. The US Hous ...…
 
Australia’s Anti-Encryption Bill Passes, Banks Get Hit With Old School Social Engineering and new school tech, and Huawei gets banned in multiple countries! All that coming up now on ThreatWire. #threatwire #hak5 -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆Our Site → https://www.hak5.orgShop → https://www.hakshop.comSubscribe → ...…
 
In their final episode of 2018, Christopher Glyer and Nick Carr brought the holiday cheer by providing a wrap-up on interesting targeted attacker activity from the past 90 days, including CNIIHM links to TRITON ICS attacks, suspected APT29 spearphishing campaign, several recent DOJ indictments. They also highlighted some interesting techniques ...…
 
In October, Google dramatically announced that it would shut down Google+ in August 2019, because the company had discovered through an internal audit (and a simultaneous Wall Street Journal exposé) that a bug in Google+ had exposed 500,000 users' data for about three years. Maybe it should have pulled the plug sooner. On Monday, Google announc ...…
 
Google login Twitter login Classic login