Security public [search 0]
×
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
D
Darknet Diaries
Monthly
 
Explore the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of privacy hacks, data breaches, and cyber crime. The masterful criminal hackers who dwell on the dark side show us just how vulnerable we all are.
 
H
Hackable?
Monthly
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are.Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
 
T
The CyberWire
รายวัน
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
C
CYBER
Weekly
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
R
Risky Business
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
 
S
Smashing Security
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...Winner: "Best Security Podcast 2018" and "Best Security Podcast 2019."Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
C
CYBER
Weekly
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity.
 
H
Hacking Humans
Ogni settimana
 
Each week the CyberWire’s Hacking Humans Podcast looks behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a heavy toll on organizations around the world. We talk to social engineering experts, security pros, cognitive scientists, and those practiced in the arts of deception (perhaps even a magician or two). We also hear from people targeted by social engineering attacks and learn from their experiences.
 
With nearly 300 million books in print and countless topics covered, the iconic For Dummies book series revolutionized learning by making complex subjects easy to understand. Now each week, FOR DUMMIES: The Podcast, hosted by Eric Martsolf, will explore one of the For Dummies titles in their approachable, fun style. From cryptocurrency to wine, sex to cybersecurity, forensics to Fortnite, and everything in between. Send your questions or comments to: questions@fordummiespodcast.com
 
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
 
M
Malicious Life
Monthly+
 
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
 
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
 
R
Risky Business
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
Podcast by Sophos
 
Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) ab ...
 
F
FUTURE STATE
Monthly+
 
The Future State Podcast will be tackling the issues at that intersection of technology, politics, and national security. Host Richard A Clarke served the last three Presidents as a senior White House Advisor holding the titles of Special Assistant to the President for Global Affairs, National Coordinator for Security and Counterterrorism, and Special Advisor to the President for Cyber Security. He will be talking to some of the most fascinating people on the front lines. In Season 1, Richar ...
 
I'm Daniel Miessler, and I spend 5-20 hours a week consuming books, podcasts, and articles around the intersection of security, technology, and humans. Each episode—which is available as both a newsletter and a podcast—is either a curated summary of what I learned in the past week, or a standalone idea that hopefully gives you something to think about.
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. His new show “Pod Save the World” will bring you behind the scenes into White House Situation Room meetings and secret negotiations through a series of conversations with people who were there.
 
Entertaining stories of how others got into Information Security (aka cybsersecurity), their experiences, lessons learned, and advice about getting in. Join my newsletter.Listen for an "Easter Egg" in each show!If you're looking to break into infosec, I wrote a little guide! Check it out:“I purchased the kindle book last night and just finished it. It was a great “mini-mentoring” session, and I felt encouraged to persevere. I plan to listen to the podcasts regularly. As a woman getting into ...
 
B
Beers with Talos Podcast
Μηνιαία+
 
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues, all with beer.
 
D
Defense in Depth
Weekly
 
Join Allan Alford, former CISO of Mitel, and David Spark, founder of CISOSeries.com, each week as we choose one controversial cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
 
Information Security is the name of the game. Don't let the hackers win!
 
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
 
O
Off The Hook
Monthly+
 
Off The Hook a podcast from 2600: The Hacker Quarterly. It discusses the hacker's view of the emerging technology, and the threats posed by an increasingly Orwellian society. Hear updates on security flaws from the hacker perspective, as well as the latest news from within the hacker community. Follow us on Twitter @HackerRadioShow and Mastodon @HackerRadioShow@Mastodon.social
 
7
7 Minute Security
Ugentligt
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life.
 
CSIS looks at how rapidly changing technology and cybersecurity are affecting the world in the twenty-first century. Issues covered include intelligence, surveillance, encryption, privacy, military technology, space, and more. Programs leading the research on this topic include the Technology Policy Program and the International Security Program.Find the latest research from our scholars and CSIS events on this topic below.
 
Geopolitical & Macro Strategy discussions focusing on risks around the globe that have the capacity to impact capital markets and the world economy
 
T
ThugCrowd
Weekly
 
Join us every week for live discussions on hacking, phreaking, and everything that DOESNT SUCK in infosec!
 
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Director of Consulting at FRSecure and a 20+ year veteran of the industry. Hosting things like F ...
 
Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
 
Get in-depth coverage of security news and trends at WIRED. A SpokenEdition transforms written content into human-read audio you can listen to anywhere. It's perfect for times when you can’t read - while driving, at the gym, doing chores, etc. Find more at www.spokenedition.com
 
C
Cyber Security Today
Еженедельно+
 
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
 
The editors of Decipher talk with a rotating cast of security practitioners, researchers, and executives about a variety of topics in the security and privacy fields.
 
Discussions, tips, and debates around improving the communications and services that security vendors provide to their customers, the security buyer.
 
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
 
Every 2 weeks, Conor Gilsenan hosts a conversation with creators, researchers, founders, and advocates who are working to improve the usability of security and privacy technologies.Guests share what they are currently working on, how they got to where they are today, who they are trying to help, and what keeps them motivated to overcome challenges along the way.The goal is for the rest of us to learn from their experiences and go on to promote usable security and privacy within our own proje ...
 
Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) ab ...
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
Loading …
show series
 
Attacks Against NVMS-9000 DVR Web Vulnerability https://isc.sans.edu/forums/diary/Scanning+Activity+for+NVMS9000+Digital+Video+Recorder/25434/ Pixel 4 Face Unlock Works with Eyes Shut https://www.bbc.com/news/technology-50085630 Samsung Galaxy S10 Fingerprint Unlock Bug https://www.bbc.com/news/technology-50080586 Alexa/Google Home Phishing htt ...…
 
This week, we welcome Daniel DeCloss, President and CEO of PlexTrac, to talk about what makes an excellent pentest report! In our second segment, we talk Security News, how hackers can hijack your local airport, Baltimore to buy $20M in cyber insurance months after the attack, a dangerous Kubernetes bug that allows authentication bypass-DoS, an ...…
 
We air three pre-recorded interviews from Hacker Halted with Cathy Ullman, Joe Gray, and Jenny Radcliffe! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode157
 
Researchers at Independent Security Evaluators (ISE) recently published a report titled SOHOpelessly Broken 2.0, Security Vulnerabilities in Network Accessible Services. This publication continues and expands previous work they did examining small office/home office (SOHO) routers, network-attached storage devices (NAS), and IP cameras. Shaun M ...…
 
A dangerous hacker group resurfaced, Mark Zuckerberg delivered a long-winded defense of Facebook, and Volvo is going green. Here's the news you need to know, in two minutes or less. Want to receive this two-minute roundup as an email every weekday? Sign up here! Today’s Headlines Stealthy Russian hacker group resurfaces with clever new tricks A ...…
 
This week, Javier Leiva joins me to discuss his amazing podcast about people pretending to be someone else: ‘Pretend’.Support for this show comes directly from my new book Extreme Privacy. More details can be found at https://inteltechniques.com/books.html.Listen to all episodes at https://inteltechniques.com/podcast.htmlINTRO:https://www.onxma ...…
 
Today's podcast covers a Canada Post password alert, a new sextortion campaign, Samsung phone fingerprint trouble, malware in sound files and exposed resumesBy ITWC.
 
The Tin Foil Hats Club returns for its sixth episode. In this edition Jenny chats with Quentin Taylor, the Bushtucker CISO, as a follow up to the grab bag episode (No. 111) with Stuart Coulson and Cary Hendricks. Listen in as preparedness, the Hunted TV show and ideas for survival from movies are all discussed. To follow Quentin on Twitter, cli ...…
 
In light of National Cybersecurity Awareness Month, we're giving you a special splinter episode all about social media. Harry McMullin shares insights into what it was like growing up with social media from as early as ten, Mark Stockley gives the perspective of a parent with two children currently under ten and Alice Duckett discusses cancel c ...…
 
When Mr. Robot premiered in 2015 it was an immediate hit not just in the hacker community but with wider audiences, as well. The show follows the exploits of Elliot Alderson, a troubled young loner who gets involved with a small group of other hackers called F-Society and runs up against a variety of adversaries connected to the monolithic E-Co ...…
 
Derbycon9 talk - PowerShell Security Looking Back from the Inside - https://www.youtube.com/watch?v=DYWPtt7qszY&list=PLNhlcxQZJSm_ZDJBksg97I5q1XsdQcyN5&index=27&t=0s Encarta - https://en.wikipedia.org/wiki/Encarta Scott Hanselman’s twitter thread about Encarta: https://twitter.com/shanselman/status/1158780839464849409 Congrats on the black badg ...…
 
Footballers' wives go to war over Instagram leaks, it turns out fake news is fine on Facebook (just so long as it's in a political ad), and things take a horrific turn in Japan, as a stalker uses a scary technique to find out where his pop idol lives. All this and much much more is discussed in the latest edition of the "Smashing Security" podc ...…
 
This week's stories A sobering reminder about supply chain attacks Facebook's stance on end-to-end encryption raises official protests UNIX's Co-Creator Ken Thompson's BSD UNIX Password Has Finally Been Cracked Japanese stalker finds idol using reflections in her eyes Americans and Digital Knowledge OpenPGP being built into Mozilla's Thunderbir ...…
 
Welcome Down the Security Rabbithole, to the DtSR Podcast. This week, Zac Rosenbauer joins us to talk about what it's like to be "the IT guy" who also has to be vigilant of security in a fast-paced startup...based on Google's cloud platform. It's a riveting episode that will give you some good guideposts if you're about to DIY. Highlights from ...…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/rated-1-in-irresponsible-security-journalism/) No security alert is too small for us to completely misrepresent its severity. The sky is falling on the latest episode of CISO/Security Vendor Relationship Podcast. Thanks to this week's podcast sponsor, Zix. ...…
 
Rachel Washburn and Lieutenant General Robert Walsh discuss the partnership between the United States and Turkey. Recent escalations between Turkey and the Kurds in northern Syria has many Americans questioning the motives and thoughts behind the US reaction to the conflict. Table of Contents:U.S.-Turkey partnership history: 00:00 – 5:19Turkey’ ...…
 
Brad and Evan are reunited in-studio for episode 49 of the UNSECURITY podcast. With Evan still touring the country for the #S2Roadshow, the conversation starts with a recap. The duo adds a discussion about IT Security, Information Security, Cyber Security, and Physical Security. They field a listener request about the Cybersecurity Maturity Mod ...…
 
On this week’s show, we welcome back Lauren Zabierek. The last time she joined us, she was a senior intelligence analyst at Recorded Future, but she’s since taken on the role of director of the cybersecurity project at Harvard’s Belfer Center. She shares the mission of her organization, the role she thinks it has to play on the national and int ...…
 
In this episode I talk about some things I learned about making your own kick-butt cred-capturing phishing campaign and how to do so on the (relatively) quick and (relatively) cheap! These tips include: Consider this list of top 9 phishing simulators. Check out GoPhish! Then spin up a free tier Kali AWS box Follow the instructions to install Go ...…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-user-centric-security/) How can software and our security programs better be architected to get users involved? Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spar ...…
 
https://www.csoonline.com/article/3441220/marriott-data-breach-faq-how-did-it-happen-and-what-was-the-impact.htmlBy Jerry Bell and Andrew Kalat.
 
Are fancy security solutions like Palo Alto firewalls, ExtraHop or LogRhythm going to keep you secure? By them selves, no. It doesn’t matter what the vendor says. There’s no such thing as a security solution that magically saves the day. A good solid security process and best practice is the key to any security program. FIND US ON 1. Facebook 2 ...…
 
In this episode, veteran hacker and red teamer Tom Van de Wiele answers questions from our listeners. Tom covers the ethics of ethical hacking, how to prioritize solving the myriad of security issues companies face, why he includes a banana in his hacking kit, the importance of communication skills in his job, and much more. A great listen both ...…
 
Google login Twitter login Classic login