Best cryptogram podcasts we could find (Updated June 2017)
Related podcasts: Schneier Newsletter Henage Bruce Security Information Dan Tech Social Sciences Science Software Development  
Cryptogram public [search 0]
show episodes
 
C
Crypto-Gram Security Podcast
Monthly
 
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter
 
C
Crypto-Gram Security Podcast
Monthly
 
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter
 
C
Crypto-Gram Security Podcast
Monthly
 
Audio of Bruce Schneier's Monthly Crypto-Gram Security Newsletter
 
Loading …
show series
 
D
Design Yourself: For People Who Want More
 
Ever wonder who makes our pretty and original cover art each week? It’s today’s guest, the designer and printer behind the Cincinnati-based studio Cryptogram, Jon Flannery. Jon shares with our Design Yourself community what motivates him in his work as a designer and entrepreneur. You will learn the mix of science and art that integrates in his ...…
 
C
Crypto-Gram Security Podcast
 
In this issue: Who is Publishing NSA and CIA Secrets, and Why? The Quick vs. the Strong: Commentary on Cory Doctorow's "Walkaway" Securing Elections Surveillance and our Insecure Infrastructure from the May 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: Who is Publishing NSA and CIA Secrets, and Why? The Quick vs. the Strong: Commentary on Cory Doctorow's "Walkaway" Securing Elections Surveillance and our Insecure Infrastructure from the May 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: Who is Publishing NSA and CIA Secrets, and Why? The Quick vs. the Strong: Commentary on Cory Doctorow's "Walkaway" Securing Elections Surveillance and our Insecure Infrastructure from the May 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: The TSA's Selective Laptop Ban WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies Shadow Brokers Releases the Rest of Their NSA Hacking Tools Congress Removes FCC Privacy Protections on Your Internet Usage Incident Response as "Hand-to-Hand Combat" Fourth WikiLeaks CIA Attack Tool Dump Security Orchestration and In ...…
 
C
Crypto-Gram Security Podcast
 
In this issue: The TSA's Selective Laptop Ban WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies Shadow Brokers Releases the Rest of Their NSA Hacking Tools Congress Removes FCC Privacy Protections on Your Internet Usage Incident Response as "Hand-to-Hand Combat" Fourth WikiLeaks CIA Attack Tool Dump Security Orchestration and In ...…
 
C
Crypto-Gram Security Podcast
 
In this issue: The TSA's Selective Laptop Ban WikiLeaks Not Disclosing CIA-Hoarded Vulnerabilities to Companies Shadow Brokers Releases the Rest of Their NSA Hacking Tools Congress Removes FCC Privacy Protections on Your Internet Usage Incident Response as "Hand-to-Hand Combat" Fourth WikiLeaks CIA Attack Tool Dump Security Orchestration and In ...…
 
C
Crypto-Gram Security Podcast
 
In this issue: WikiLeaks Releases CIA Hacking Tools Botnets Defense Against Doxing Buzzword Watch: Prosilience The CIA's "Development Tradecraft DOs and DON'Ts" from the March 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: WikiLeaks Releases CIA Hacking Tools Botnets Defense Against Doxing Buzzword Watch: Prosilience The CIA's "Development Tradecraft DOs and DON'Ts" from the March 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: WikiLeaks Releases CIA Hacking Tools Botnets Defense Against Doxing Buzzword Watch: Prosilience The CIA's "Development Tradecraft DOs and DON'Ts" from the March 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
They say Ricky was too dumb to write the cryptogram that got him killed, but to this day the FBI still can't figure it out.
 
C
Crypto-Gram Security Podcast
 
In this issue: Security and the Internet of Things Security and Privacy Guidelines for the Internet of Things from the February 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: Security and the Internet of Things Security and Privacy Guidelines for the Internet of Things from the February 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: Security and the Internet of Things Security and Privacy Guidelines for the Internet of Things from the February 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
Is there evidence of life of death? What should we make of claims about near-death experiences, apparitions, and psychic encounters? For this episode of the show, I talk with Keith Augustine about these questions and more. Mr. Augustine is the Executive Director and Scholarly Paper Editor at Internet Infidels. He holds a Master’s in Philosophy ...…
 
H
House of Mystery True Crime History
 
J.R. Watts is a former investigator for the City and State of New York, having worked in various government agencies in his capacity as an investigator for over two decades. He has worked hand in hand with various federal agencies on joint investigations. Watts was also a code-breaker, educated in cryptology & various forms of camouflage techni ...…
 
This is a two hour show featuring Patty Greer, one of the most exciting adventurers on our planet. Patty was a singer and songwriter, musician and composer- who because of a serious injury- basically left her career to explore the mysterious phenomena of crop circles. To this end, Patty turned to film making and has created six films so far pre ...…
 
C
Crypto-Gram Security Podcast
 
In this issue: Attributing the DNC Hacks to Russia Are We Becoming More Moral Faster Than We're Becoming More Dangerous? Security Risks of TSA PreCheck Law Enforcement Access to IoT Data Class Breaks A Comment on the Trump Dossier from the January 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage…
 
C
Crypto-Gram Security Podcast
 
In this issue: Attributing the DNC Hacks to Russia Are We Becoming More Moral Faster Than We're Becoming More Dangerous? Security Risks of TSA PreCheck Law Enforcement Access to IoT Data Class Breaks A Comment on the Trump Dossier from the January 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage…
 
C
Crypto-Gram Security Podcast
 
In this issue: Attributing the DNC Hacks to Russia Are We Becoming More Moral Faster Than We're Becoming More Dangerous? Security Risks of TSA PreCheck Law Enforcement Access to IoT Data Class Breaks A Comment on the Trump Dossier from the January 15, 2017 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage…
 
C
Crypto-Gram Security Podcast
 
In this issue: My Priorities for the Next Four Years Hacking and the 2016 Presidential Election Dumb Security Survey Questions from the December 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: My Priorities for the Next Four Years Hacking and the 2016 Presidential Election Dumb Security Survey Questions from the December 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: My Priorities for the Next Four Years Hacking and the 2016 Presidential Election Dumb Security Survey Questions from the December 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
A
Atomic Trivia War 9000
 
Teddy Roosevelt, hero of the Spanish-American War and president of the United States, had some weird pets. This factoid and more in this episode of the ATOMIC TRIVIA WAR 9000, as well as a contest! Enter by decoding the cryptogram hidden in this week's questions. Send the answer to Jason at atw9k@simplysyndicated.com and one lucky person will g ...…
 
G
GeoGearHeads; The weekly show for Geocaching and Location-Based Gaming
 
Ciphers are again the topic for the two hundred fifty-fifth edition of the GeoGearHeads as Jennifer of teamajk and "Geocaching Puzzle of the Day" talks us through solving them. Some resources she mentioned were: ACA Cipher Listing Cryptogram solver Rumkin Cryptocrack Bion's Gadgets Geocaching Toolbox "How To Puzzle Cache" Sujojeepers' Caches In ...…
 
G
GeoGearHeads; The weekly show for Geocaching and Location-Based Gaming
 
Ciphers are again the topic for the two hundred fifty-fifth edition of the GeoGearHeads as Jennifer of teamajk and "Geocaching Puzzle of the Day" talks us through solving them. Some resources she mentioned were: ACA Cipher Listing Cryptogram solver Rumkin Cryptocrack Bion's Gadgets Geocaching Toolbox "How To Puzzle Cache" Sujojeepers' Caches In ...…
 
C
Crypto-Gram Security Podcast
 
In this issue: Security Economics of the Internet of Things Cybersecurity Issues for the Next Administration Security Design: Stop Trying to Fix the User Recovering an iPhone 5c Passcode The Hacking of Yahoo from the October 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: Security Economics of the Internet of Things Cybersecurity Issues for the Next Administration Security Design: Stop Trying to Fix the User Recovering an iPhone 5c Passcode The Hacking of Yahoo from the October 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: Security Economics of the Internet of Things Cybersecurity Issues for the Next Administration Security Design: Stop Trying to Fix the User Recovering an iPhone 5c Passcode The Hacking of Yahoo from the October 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: The NSA Is Hoarding Vulnerabilities Someone Is Learning How to Take Down the Internet Organizational Doxing and Disinformation iPhone Zero-Day Used by UAE Government Apple's Cloud Key Vault from the September 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: The NSA Is Hoarding Vulnerabilities Someone Is Learning How to Take Down the Internet Organizational Doxing and Disinformation iPhone Zero-Day Used by UAE Government Apple's Cloud Key Vault from the September 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: The NSA Is Hoarding Vulnerabilities Someone Is Learning How to Take Down the Internet Organizational Doxing and Disinformation iPhone Zero-Day Used by UAE Government Apple's Cloud Key Vault from the September 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
We're back with episode 45, discussing conspiracy theories. Where do they come from? How do they tie into shows like Gravity Falls and Stranger Things. Hey—what are our thoughts on Stranger Things? Don't worry, we're going to talk about it for fifteen minutes straight so buckle in. Also contains a history of the Illuminati, a suggestion for bet ...…
 
C
Crypto-Gram Security Podcast
 
In this issue: The Security of Our Election Systems Hacking the Vote Real-World Security and the Internet of Things Hacking Your Computer Monitor More on the Vulnerabilities Equities Process from the August 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: The Security of Our Election Systems Hacking the Vote Real-World Security and the Internet of Things Hacking Your Computer Monitor More on the Vulnerabilities Equities Process from the August 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: The Security of Our Election Systems Hacking the Vote Real-World Security and the Internet of Things Hacking Your Computer Monitor More on the Vulnerabilities Equities Process from the August 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Cruise of the Esmeralda, The by COLLINGWOOD, Harry
 
 
C
Cruise of the Esmeralda, The by COLLINGWOOD, Harry
 
 
C
Crypto-Gram Security Podcast
 
In this issue: CIA Director John Brennan Pretends Foreign Cryptography Doesn't Exist Report on the Vulnerabilities Equities Process Apple's Differential Privacy Google's Post-Quantum Cryptography from the July 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: CIA Director John Brennan Pretends Foreign Cryptography Doesn't Exist Report on the Vulnerabilities Equities Process Apple's Differential Privacy Google's Post-Quantum Cryptography from the July 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: CIA Director John Brennan Pretends Foreign Cryptography Doesn't Exist Report on the Vulnerabilities Equities Process Apple's Differential Privacy Google's Post-Quantum Cryptography from the July 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: The Unfalsifiability of Security Claims Arresting People for Walking Away from Airport Security Suckfly Google Moving Forward on Automatic Logins Security and Human Behavior (SHB 2016) from the June 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: The Unfalsifiability of Security Claims Arresting People for Walking Away from Airport Security Suckfly Google Moving Forward on Automatic Logins Security and Human Behavior (SHB 2016) from the June 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: The Unfalsifiability of Security Claims Arresting People for Walking Away from Airport Security Suckfly Google Moving Forward on Automatic Logins Security and Human Behavior (SHB 2016) from the June 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: Credential Stealing as an Attack Vector Helen Nissenbaum on Regulating Data Collection and Use Amazon Unlimited Fraud I'm Writing a Book on Security from the May 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: Credential Stealing as an Attack Vector Helen Nissenbaum on Regulating Data Collection and Use Amazon Unlimited Fraud I'm Writing a Book on Security from the May 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
C
Crypto-Gram Security Podcast
 
In this issue: Credential Stealing as an Attack Vector Helen Nissenbaum on Regulating Data Collection and Use Amazon Unlimited Fraud I'm Writing a Book on Security from the May 15, 2016 Crypto-Gram Newsletter by Bruce Schneier read by Dan Henage
 
Speed
Series preference
1x
1x
Volume
100%
/

Google login Twitter login Classic login