show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
  continue reading
 
Techlore Talks brings you in-depth conversations with the experts at the forefront of privacy, security, and digital rights. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode features meaningful discussions with the people building, researching, and advocating for digital freedom. From cybersecurity researchers and privacy tool developers to open-source advocates and digital rights activists—if they're shaping how we protect ourselves online, the ...
  continue reading
 
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
  continue reading
 
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
  continue reading
 
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
  continue reading
 
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
  continue reading
 
Artwork

1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™

Startuprad.io – Europe’s Startup & VC Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
  continue reading
 
Artwork

1
govtech.com Security News Podcast

Ira Victor with Samantha Stone

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
  continue reading
 
Artwork

1
Trail of Bits

Trail of Bits

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
  continue reading
 
10 Minutes could save your wallet! At Scams, Hacks and Frauds. We believe that sharing stories is the absolute best way to protect people from getting scammed or falling into a hacker's trap. By listening to our stories and sharing them with your friends and family, you can be better protected against Scammers, Fraudsters and Hackers. Each week, you and your loved ones can learn the red flags of a scam or fraud attempt just by listening to a true crime story told in the time it takes to drin ...
  continue reading
 
Artwork

1
The Is My Brand Protected? Podcast

AMD LAW Group: Brand Protection Lawyers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is a podcast about innovation, game-changing, up-leveling and trailblazing business concepts and trends mostly technology focused. We discuss current events, news and provide interviews all centered on answering the crucial question, IS MY BRAND PROTECTED? Listening to this podcast is NOT to be construed as LEGAL ADVICE. Sometimes we do not discuss legal topics at all, sometimes we just chat about innovation but we are lawyers. We may help you realize that you really need to seek profes ...
  continue reading
 
Artwork

1
The Cyber Cookie

CommSec Communications and Security Limited

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
  continue reading
 
Round the Fire with Momo is a cozy space where I sit down with friends and inspiring voices to share stories, ideas, and real-life experiences. There’s no set agenda—just honest conversations about the things that shape us. That said, many episodes naturally drift toward topics I’m passionate about, like Bitcoin, keto, and the carnivore lifestyle. So if you're into deep chats, hard money, or healing through food, pull up a seat by the fire.
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
In the highly competitive world of cryptocurrency trading, reducing costs and maximizing profits are critical factors for any successful trader. Trading fees can quickly add up, especially for frequent traders, but with GRVT's referral code “discount,” traders can benefit from a 20% discount on all trading fees. This offer is an excellent opportunity for both beginners and experienced traders to save on costs while accessing the full range of trading services provided by GRVT. In this articl ...
  continue reading
 
The Agenda podcast explores the promises of crypto, blockchain and Web3, and how everyday people level up and improve their lives with these new technologies. It covers everything from new blockchain tech to Bitcoin mass adoption and cultural shifts in Web3. Every two weeks, Cointelegraph’s The Agenda podcast tackles a new topic by speaking with the innovators and experts building the Web3 the world actually needs. After all, crypto is for everyone, not just rocket scientists, venture capita ...
  continue reading
 
Pi42 is an emerging cryptocurrency exchange that has gained attention for its user-friendly interface, strong security measures, and competitive trading fees. One of the key advantages of Pi42 is its low fees, which make it attractive to both beginner and experienced traders alike. But what if you could reduce those fees even further? By using the Pi42 referral code “QKJ013”, you can enjoy a 20% discount on trading fees, giving you even more value from the platform. In this article, we will ...
  continue reading
 
Cryptocurrency trading has rapidly evolved into a global phenomenon, offering substantial opportunities for investors, but it often comes with its fair share of challenges. One of the most significant obstacles traders face is the high trading fees that platforms typically charge. These fees, while often necessary for the platform to remain profitable, can quickly add up, especially for active traders. Fortunately, Quanto Trade offers a way to tackle this issue head-on with its Referral Code ...
  continue reading
 
Dhan is rapidly emerging as one of India’s leading stock trading apps. With a wide range of financial products and services, it caters to both beginner and professional traders. Known for its low brokerage charges, robust security features, and user-friendly interface, Dhan has quickly become a go-to platform for traders across the country. One of the standout features for new users is the ₹500 bonus they can claim by using the referral code "ASAR14". This is a fantastic incentive to start y ...
  continue reading
 
Cryptocurrency trading offers immense potential for profit, but it can also come with significant costs in the form of trading fees. If you are an active trader, you know how quickly these fees can accumulate and eat into your profits. Thankfully, Based One, a leading cryptocurrency exchange, is offering an exclusive opportunity to reduce your trading fees through its Referral Code “REBATE”. By entering this code during registration, new users can enjoy a 10% discount on trading fees, allowi ...
  continue reading
 
In the world of trading, every trader wants to maximize profits while minimizing costs. However, one significant challenge that traders often face is the impact of high trading fees. Whether you're new to trading or an experienced professional, these fees can add up and eat into your profits over time. The Avantishfi Referral Code “kickback” provides a fantastic opportunity to save 10% on trading fees, allowing you to trade more effectively while keeping more of your hard-earned capital. In ...
  continue reading
 
In the dynamic world of cryptocurrency trading, Blofin has emerged as one of the leading platforms for traders of all levels. Whether you’re a seasoned trader looking for advanced tools or a beginner wanting a user-friendly interface, Blofin has something to offer. If you’re looking to get the most out of your trading experience, using the Blofin Referral Code ”mNbmMf” will give you instant access to valuable rewards. By signing up with this referral code, new users can enjoy an immediate $9 ...
  continue reading
 
Introduction: Cryptocurrency mining can be an exciting and profitable venture, but it often comes with challenges like high initial investment, maintenance of equipment, and expensive electricity costs. Gomining has revolutionized the mining process by offering cloud mining services, which allow users to mine Bitcoin (BTC), Ethereum (ETH), and other cryptocurrencies without the need for heavy investments in mining hardware. Additionally, with Gomining Promo Code “q01MI”, you can enjoy a 10% ...
  continue reading
 
In the world of stock trading, finding a platform that offers both ease of use and robust features is key to success. Dhan App is one such platform designed for individuals and traders who want to experience seamless trading, from equities to futures and options. If you're a newcomer or an experienced trader, Dhan App provides a wide range of tools to meet your needs. By using the Dhan App Referral Code "ASAR14", you can unlock a 500 Rs bonus to kickstart your trading journey. This article w ...
  continue reading
 
In today’s dynamic cryptocurrency market, selecting the right exchange is crucial for maximizing profits and ensuring a seamless trading experience. CoinW has quickly become one of the top cryptocurrency exchanges due to its low fees, high liquidity, and user-friendly interface. By signing up using the CoinW Referral Code "1300362", you can unlock up to $1,000 in bonuses, benefit from reduced trading fees, and earn lifetime commissions from your referrals. This article will provide an in-dep ...
  continue reading
 
Introduction: Discover the Power of Poloniex for Crypto Trading The world of cryptocurrency is filled with opportunities, but it’s essential to choose the right exchange platform to maximize your profits and trading potential. Poloniex has firmly established itself as one of the most popular and reliable exchanges in the industry, offering an array of features that cater to both beginner and advanced traders. Poloniex offers a seamless trading experience, low fees, and a wide variety of digi ...
  continue reading
 
Cryptocurrency trading continues to expand globally, offering new opportunities for individuals to profit from the ever-evolving market. As the demand for digital assets rises, selecting the right trading platform becomes critical for success. Phemex has rapidly emerged as a top cryptocurrency exchange known for its low fees, advanced trading features, and a wide selection of cryptocurrencies. By signing up using the Phemex Invitation Code "BVBE73", new users can unlock up to $8,800 in tradi ...
  continue reading
 
As the world of cryptocurrency continues to grow, more traders are diving into digital assets like Bitcoin (BTC), Ethereum (ETH), and a variety of altcoins. While the opportunities for profit are vast, the high transaction fees associated with many cryptocurrency exchanges can significantly erode potential gains. Fortunately, KCEX, a leading cryptocurrency exchange, offers a solution by providing low trading fees and high security. And, with the KCEX Invite Code "DISCOUNT", you can unlock an ...
  continue reading
 
If you're an avid cryptocurrency trader or someone just getting started, you understand that fees can quickly eat into your profits. Fortunately, Axiom Trade offers a solution with its Axiom Trade Invite Code "kickback", which allows users to save 15% on trading fees. Whether you're making your first trade or you're a seasoned trader, using the referral code ensures that you can keep more of your profits. This article will explain how you can take advantage of this offer, why Axiom Trade is ...
  continue reading
 
Loading …
show series
 
Our final news roundup for 2025 is a holiday sampler of tasty, chewy (and a few yucky) confections. We look at a years-long exploit campaign that used browser extensions to steal credentials, inject malicious content, and track behavior; tracks ongoing exploits using the React2Shell vulnerability; and debates whether a surveillance camera maker’s p…
  continue reading
 
This week's Surveillance Report covers the dangerous reality that social media bans ARE age verification, India's push for even more invasive phone surveillance, a massive vulnerability actively exploited against major companies, the EU's new proposal to gut GDPR protections, Petco's escalating security disasters, border agents charging people for …
  continue reading
 
Google's new Developer Registration Program is catastrophic for F-Droid and open source app distribution. In this interview, Marc Prud'hommeaux from the F-Droid Board of Directors explains what's happening, why it matters (even if you only use the Google Play Store or Apple's App Store), and what concrete actions you can take RIGHT NOW. We discuss …
  continue reading
 
A devastating new React vulnerability earned a "perfect 10" for risk, letting attackers remotely run code on a million-plus servers with a single HTTP request. Find out what happened, how fast attackers moved in, and why this bug changes everything for web security. France's VanityFair face a stiff fine over cookies. GrapheneOS pulls out of France …
  continue reading
 
A devastating new React vulnerability earned a "perfect 10" for risk, letting attackers remotely run code on a million-plus servers with a single HTTP request. Find out what happened, how fast attackers moved in, and why this bug changes everything for web security. France's VanityFair face a stiff fine over cookies. GrapheneOS pulls out of France …
  continue reading
 
John Carvalho, CEO of Synonym, has proposed in BIP-177 that we replace “sats” with “bitcoins” as the base unit. The idea gained attention and even support from notable Bitcoiners like Jack Dorsey and Samson Mow. In this video, I break down what this change would mean, why it’s being proposed, and whether we should actually make the shift.---🟩 To he…
  continue reading
 
Tell us your story here! In this enlightening episode of Scams, Hacks, and Frauds, we delve into the world of Ponzi schemes, using the infamous Charles Ponzi as our guide. Discover how these fraudulent schemes operate and the subtle ways you might inadvertently become entangled in one. We explore the fascinating story of Charles Ponzi, who in 1919,…
  continue reading
 
Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account takeovers, and illicit access to sensitive documents and files. On today’s Packet Protector we talk with sponsor Material Security about how it brings additional layers of protection to Google Workspa…
  continue reading
 
Speed is winning deals, but speed is also feeding fraud. We sit down with CRC Specialty Professional Lines Broker Mark Waldeck to unpack the messy middle where e‑signatures, legacy policy language, and decentralized bank controls collide. From the difference between a simple e‑signature and a cryptographically protected digital signature to why und…
  continue reading
 
This week's Surveillance Report covers India’s attempt to mandate a potentially invasive app on everyone’s phone, Chat Control updates in the EU with concerns still evolving, half of US states now being age verified, more AI Slop, butt to cloud encryption, and more! Correction: One of you caught my mistake! The poopinator device is $600 *with* a mo…
  continue reading
 
In this episode KJ Burke discusses the technology trends of 2025 and predictions for 2026. He covers the maturation of AI, the importance of treating data as a product, innovations at the edge, managing cross-cloud environments, building business resiliency and automating the skills gap. Looking ahead, he highlights key trends for 2026, including A…
  continue reading
 
Chris and Momo share their top film picks that every Bitcoiner should watch.---00:00 - Intro02:48 - World on a Wire (1973) by Rainer Werner Fassbiner18:48 - Blade Runner (1982) by Ridley Scott22:42 - Blade Runner 2049 (2017) by Denis Villeneuve30:14 - RoboCop (1987) by Paul Verhoeven43:56 - Judge Dredd (1995) by Danny Cannon49:31 - Dredd (2012) by …
  continue reading
 
Cisco has finally admitted it's time for real change and is vowing to build "secure by default" gear after decades of criticism. Steve Gibson reacts to a rare moment when a tech giant actually gets security right—and what it means for everyone running critical infrastructure. • Scattered Lapsus$ Hunters strikes (Salesforce) again. • Cisco actually …
  continue reading
 
Cisco has finally admitted it's time for real change and is vowing to build "secure by default" gear after decades of criticism. Steve Gibson reacts to a rare moment when a tech giant actually gets security right—and what it means for everyone running critical infrastructure. • Scattered Lapsus$ Hunters strikes (Salesforce) again. • Cisco actually …
  continue reading
 
There may be misconfigurations and other problems lurking in your wireless network. From a lack of peer isolation to poor segmentation to RADIUS problems and vendor fails, these issues can make your WLAN less secure. Jennifer “JJ” Minella goes from Packet Protector co-host to guest as she discusses these issues with Drew Conry-Murray. This episode.…
  continue reading
 
Threat informed defense means using knowledge about real attacks to guide security work, so defensive choices stay connected to how adversaries actually behave in the world. For a beginner, this idea matters because it turns cybersecurity from a pile of disconnected tools into a story about attackers, their steps, and the ways defenders can interru…
  continue reading
 
Alert triage is the first pass an analyst makes on incoming security alerts. In those first few minutes, the analyst decides whether something needs fast action or patient investigation. The goal is not to solve every detail immediately, but to understand whether the situation is dangerous, harmless, or still unclear. For beginners, this moment can…
  continue reading
 
Logs are the raw notes that help turn messy digital activity into clear security stories. Every website, device, and application constantly writes these notes in the background, even when people barely notice them. Security teams use logs to understand what really happened when something breaks or looks suspicious, instead of guessing based on inco…
  continue reading
 
Security controls are the many small and large actions, tools, and rules that organizations use to keep information, systems, and people safe from harm. When someone installs a lock, sets up a password, turns on monitoring, or writes a policy, they are putting a control in place to shape what can happen and how problems are handled. At first, the i…
  continue reading
 
Defense in depth is a simple idea that quietly shapes strong cybersecurity for real organizations. Instead of trusting one perfect barrier, defense in depth stacks several ordinary protections so mistakes stay small. A beginner might hear about firewalls, antivirus, passwords, and backups as separate topics, without seeing how they support each oth…
  continue reading
 
Network segmentation sounds like a complex expert topic, but it starts very simply. If you understand that computers send messages over shared roads, segmentation shapes those roads. Earlier episodes described basic networks and architectures, the maps connecting devices and services together. This episode builds on that foundation and zooms in on …
  continue reading
 
Welcome to our exploration of why you cannot secure what you cannot see in cybersecurity. This episode focuses on asset inventory, the simple idea of knowing exactly what technology you depend on every day. Before anything else, you need to understand what security professionals mean when they say the word assets. In security, assets are anything v…
  continue reading
 
Patch and update management is where earlier vulnerability concepts finally turn into concrete daily security actions. When you scan for weaknesses or read about new flaws, the story only becomes real when something actually changes on your systems. A patch is a small piece of software code that fixes a known flaw in an existing product, closing a …
  continue reading
 
Vulnerabilities sit at the center of almost every cybersecurity story people read about today. A vulnerability is a weakness in hardware, software, or a process that an attacker can misuse to cause harm. When organizations understand their vulnerabilities clearly, they can fix the most dangerous ones before someone takes advantage of them in the re…
  continue reading
 
Threat modeling is a structured way to think about how systems might be attacked before any real harm occurs. Instead of picturing hacking as mysterious magic, threat modeling turns it into a calm, methodical review of what could go wrong and how serious each problem might be. For beginners, it provides a guided path to notice important details tha…
  continue reading
 
Europe's startup narrative is changing fast — from apps and valuations to sovereignty, infrastructure and resilience. In this month's DACH Startup News, we unpack the moves that made European tech sovereignty the defining theme of 2025. What you’ll learn: – Why sovereign cloud is becoming foundational for startups and enterprise buyers – How AI, ro…
  continue reading
 
This week's Surveillance Report covers Microsoft's AI Disaster getting worse on multiple levels as well as Google's AI, Malware is stealing E2EE messages from people all around the world, and updates to Chat Control & other EU regulations, and more! Support Techlore: https://techlore.tech/support Timestamps Sources 00:00 Welcome to Surveillance Rep…
  continue reading
 
Could banning VPNs really become law in the US? This episode breaks down the jaw-dropping legislation in Wisconsin and Michigan that targets VPN access for everyone, not just kids—and what it means for your digital privacy. The EU finally comes to its "Chat Control" senses. Windows 11 to include SysInternals Sysmon natively. Chrome's tabs (optional…
  continue reading
 
Could banning VPNs really become law in the US? This episode breaks down the jaw-dropping legislation in Wisconsin and Michigan that targets VPN access for everyone, not just kids—and what it means for your digital privacy. The EU finally comes to its "Chat Control" senses. Windows 11 to include SysInternals Sysmon natively. Chrome's tabs (optional…
  continue reading
 
Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be manipulated for malicious purposes, and they often handle sensitive data. Then the rise of public cloud and microservices architectures added new layers…
  continue reading
 
Cyber attacks rarely happen as single isolated moments; they usually unfold in connected stages over time. When headlines talk about a breach, they often focus on the final impact, such as stolen data or encrypted files, and they skip the many earlier steps that made that result possible. A beginner who only sees the ending can feel confused, surpr…
  continue reading
 
Tell us your story here! In this gripping episode of Scams, Hacks, and Frauds, we explore the dark underbelly of cryptocurrency and how unsuspecting individuals can become entwined in complex fraud schemes. Meet Jian Wren, a resilient woman who, after enduring years of hardship, finds herself caught in a web of deceit involving a criminal mastermin…
  continue reading
 
Show Notes - https://forum.closednetwork.io/t/episode-49-interview-with-zach-w-developing-coze-js-encryption-cryptography-chat/168 Website / Donations / Support - https://closednetwork.io/support/ BTC Lightning Donations - [email protected] / [email protected] Thank You Patreons! - https://www.patreon.com/closednetwork Michael Bates - Privac…
  continue reading
 
Even with encryption and 2FA, if someone steals your logged-in laptop, you're compromised. Michael Altfield created Buskill - an open source USB "dead man switch" - to solve this analog attack vector. In this interview, you’ll hear about the real incidents that inspired it, the advocacy work that fueled it, and the collaborative engineering efforts…
  continue reading
 
What if the biggest cyber risk inside your company wasn’t malware — but identity? In this episode, I sit down with Santhosh Jayaprakash, founder & CEO of UnoSecur, to unpack one of the fastest-moving transformations in cybersecurity: the rise of identity as the new perimeter. Attackers don’t break in anymore — they log in. And with AI agents, LLM w…
  continue reading
 
Episode 245: This week's Surveillance Report covers WhatsApp's massive phone number enumeration flaw that exposed 3.5 billion users' data through poor rate limiting - potentially the largest data exposure in history. I also examine Google's new Android sideloading restrictions threatening open app distribution, the EU's concerning Digital Omnibus p…
  continue reading
 
After 4+ years, Nate from The New Oil is stepping down from co-hosting the pod, but Surveillance Report isn't going anywhere. Here's what's changing, what's staying the same, and how to continue listening to Surveillance Report! (Hint: Nothing changes here on the podcast!) Surveillance Report continues with the same mission: weekly privacy and secu…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play