Tech Hack public
[search 0]
More
Download the App!
show episodes
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
  continue reading
 
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
How Hacks Happen

Many Worlds Productions

Unsubscribe
Unsubscribe
Monthly
 
Hacks, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
  continue reading
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork
 
Modem Mischief tells the true stories of the outlaws of cyberspace. Hackers, dark web lurkers and cybercrime perpetrators of the digital underground are explored in this true crime series.
  continue reading
 
Artwork

1
ITSPmagazine Podcast Network

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
  continue reading
 
Artwork
 
Tech News Briefing is your guide to what people in tech are talking about. Every weekday, we’ll bring you breaking tech news and scoops from the pros at the Wall Street Journal, insight into new innovations and policy debates, tips from our personal tech team, and exclusive interviews with movers and shakers in the industry. Hosted by Zoe Thomas
  continue reading
 
Decoder is a show from The Verge about big ideas — and other problems. Verge editor-in-chief Nilay Patel talks to a diverse cast of innovators and policymakers at the frontiers of business and technology to reveal how they’re navigating an ever-changing landscape, what keeps them up at night, and what it all means for our shared future.
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018, 2019, and 2023, and the "Most Entertaining" in 2022 and 2023, Smashing Security has had over nine million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the pod ...
  continue reading
 
Download This Show is your weekly guide to the world of media, culture, and technology. From social media to gadgets, streaming services to privacy issues. Each week Marc Fennell and a team of people far smarter than him (his words, not ours) take a fun deep dive into how technology is reshaping our lives.
  continue reading
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
  continue reading
 
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
  continue reading
 
Artwork
 
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

Unsubscribe
Unsubscribe
Weekly
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork
 
If you’re looking to understand the business of security, then Business Security Weekly is your show! Matt and Paul cover security for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your security program, solve real problems, learn leadership skills and so much more!
  continue reading
 
Welcome to the cozy corner of the tech world where ones and zeros mingle with casual chit-chat. Datatopics Unplugged is your go-to spot for relaxed discussions around tech, news, data, and society. Dive into conversations that should flow as smoothly as your morning coffee (but don't), where industry insights meet laid-back banter. Whether you're a data aficionado or just someone curious about the digital age, pull up a chair, relax, and let's get into the heart of data, unplugged style!
  continue reading
 
Join lively and organic conversations about today's most relevant topics, analyzed through the human, real and unfiltered lens of your favorite entrepreneurs, athletes, musicians, artists, creators, politicians, investors, and crypto geniuses. Hopefully, this podcast helps you form the opinions, mindset and habits you need to build the life you want. Thank you for listening.
  continue reading
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Artwork

1
The Digital Marketing Podcast

Ciaran Rogers, Daniel Rowles and Louise Crossley

Unsubscribe
Unsubscribe
Weekly
 
A weekly digital marketing podcast with listeners in over 190 countries worldwide.The Digital Marketing Podcast combines interviews with global experts, together with the latest news, tools, strategies and techniques to give your digital marketing the edge. Perfect for your daily commute, the podcast aims to be both entertaining and informative. Produced by Target Internet and hosted by Daniel Rowles, Ciaran Rogers and Louise Crossley. Find out more at targetIniernet.com/podcasts
  continue reading
 
Hackaday Editors take a look at all of the interesting uses of technology that pop up on the internet each week. Topics cover a wide range like bending consumer electronics to your will, designing circuit boards, building robots, writing software, 3D printing interesting objects, and using machine tools. Get your fix of geeky goodness from new episodes every Friday morning.
  continue reading
 
Welcome to NADDPOD! Join Dungeon Master Brian Murphy as he leads players Emily Axford, Caldwell Tanner and Jake Hurwitz on a comedic, actual-play adventure through the realms of Bahumia and Beyond. The show also features a score composed and performed by Emily Axford. This team has created a variety of D&D campaigns, as well as numerous other series such as DUNGEON COURT and 8-BIT BOOK CLUB. They also occasionally hit the road and roll dice live on stage.
  continue reading
 
Loading …
show series
 
This story was originally published on HackerNoon at: https://hackernoon.com/from-hack-to-sale-the-journey-of-stolen-data. Have you ever wondered what happens to stolen data when it goes to the Dark web? or how does someone purchase stolen data? Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also che…
  continue reading
 
Our Heroes (AKA "The Twin Flames") delve deeper beneath Otari in order to discover the true nature of the menace that plagues it! Hellbiscuit swings for the seats, Krudbert's faith is rewarded and Cinnamon embraces a new role as the 2-Crew's Pathfinder Perusal continues! CREDITS Mixing and Sound Design - Daniel Ramos (@Schubirds on Twitter & @Dr.Sc…
  continue reading
 
We start off discussing the latest round of fundings, centered largely around data security and securing LLM use. This dovetails into a discussion about marketing language and how difficult it can be for buyers to work out what the latest round of early stage startups are doing. Next, we discuss Cloudflare and Bugcrowd's acquisitions, as well as Sy…
  continue reading
 
"Identity security has been around forever though", you might be thinking. Allow me to clarify. Identity is the largest cybersecurity product category, but most of it is focused on identity governance, authentication, multi-factor, etc. Very little of it is focused on operational identity security. It's this trend, where we recently (within the las…
  continue reading
 
For years, Apple played it safe with generative artificial intelligence. Now, the company is set to unveil new AI features. WSJ reporter Aaron Tilley joins host Zoe Thomas to explain the iPhone maker’s moves. Plus, the etiquette for phone calls has changed. WSJ’s Katherine Bindley explains why some people want a text first. Sign up for the WSJ's fr…
  continue reading
 
How well is the Biden administration coaxing semiconductor companies to build their chips in the United States? Compared to Taiwan, South Korea, Japan…or even mainland China, things are just okay. Guest: Asa Fitch, reporter for the Wall Street Journal, covering the semiconductor industry. Want more What Next TBD? Subscribe to Slate Plus to access a…
  continue reading
 
Here we are, once again from the bustling show floor at Infosecurity Europe 2024 in London, situated at the Excel Centre. Sean Martin of ITSP Magazine is your host, and he's joined by Dror Liwer, co-founder of CORO Security. Both are excited to dive deep into how CORO is expanding its focus into the European market. Day Three: Nonstop Conversations…
  continue reading
 
In this conversation, I speak with Abhishek Agrawal, co-founder and CEO of Material Security. We talk about: - Material's Security innovative approach to email security by not just preventing unauthorized access but also containing damage from potential breaches. -Abhishek's background in data infrastructure at Dropbox and how product mangers can b…
  continue reading
 
Jason Haddix's AI Course, Microsoft Recall analysis, exercise erasing trauma, AI and the jobs problem… Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler See yo…
  continue reading
 
Josh comes on the show to discuss all things related to vulnerability tracking and scoring, including the current issues with various systems and organizations including NIST, CVE, Mitre, CVSS, NVD, and more! Segment Resources: NVD blog post Josh wrote: https://anchore.com/blog/navigating-the-nvd-quagmire/ Josh's Latest post: https://opensourcesecu…
  continue reading
 
Josh comes on the show to discuss all things related to vulnerability tracking and scoring, including the current issues with various systems and organizations including NIST, CVE, Mitre, CVSS, NVD, and more! Segment Resources: NVD blog post Josh wrote: https://anchore.com/blog/navigating-the-nvd-quagmire/ Josh's Latest post: https://opensourcesecu…
  continue reading
 
In the dynamic and ever-changing world of cybersecurity, it is crucial to remain at the forefront of addressing vulnerabilities, implementing innovative solutions, and getting to know companies that are making a differences in this industry. At Infosecurity Europe 2024 in London, Sean Martin sits down with Francesco Cipollone, co-founder of Phoenix…
  continue reading
 
"Identity security has been around forever though", you might be thinking. Allow me to clarify. Identity is the largest cybersecurity product category, but most of it is focused on identity governance, authentication, multi-factor, etc. Very little of it is focused on operational identity security. It's this trend, where we recently (within the las…
  continue reading
 
This week: Take on the upstream, how hard is it to patch end-of-life software, hack millions of routers, take over millions of routers, 0-days, and no responses, hack Taylor Swift wristbands, can you detect that covert channel?, and breach reports from Ticketmaster, Snowflake, Santander, and TikTok, and top it all of with C-level DNS servers droppi…
  continue reading
 
CSAC recommends key changes to the Joint Cyber Defense Collaborative. Cloud vendor Snowflake says single-factor authentication is to blame in their recent breach. Publishers sue Google over pirated ebooks. The FBI shares LockBit decryption keys. V3B is a phishing as a service campaign targeting banking customers. Commando Cat targets Docker servers…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/what-is-fraudgpt. Hackers have their own version of ChatGPT: a chatbot that can help with malware and phishing called FraudGPT. Here's everything you need to know. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check ex…
  continue reading
 
Josh comes on the show to discuss all things related to vulnerability tracking and scoring, including the current issues with various systems and organizations including NIST, CVE, Mitre, CVSS, NVD, and more! Segment Resources: NVD blog post Josh wrote: https://anchore.com/blog/navigating-the-nvd-quagmire/ Josh's Latest post: https://opensourcesecu…
  continue reading
 
Ethena Founder: Growing to a $10B Protocol Valuation in 1 Year In this episode, we sit down with Guy Young, the founder of Ethena, to dive deep into the world of crypto and DeFi. Ethena is a groundbreaking synthetic dollar protocol built on Ethereum, and it’s shaking up the space with a crypto-native solution that doesn’t rely on traditional bankin…
  continue reading
 
The art of video game design is flourishing, but it feels like a really grim time to be in the business of making and distributing games. Huge global publishers and tiny indie studios alike are facing huge financial pressures, and it doesn’t seem to be letting up anytime soon. So where did this enormous pressure come from, if consumer interest is h…
  continue reading
 
Welcome to the cozy corner of the tech world where ones and zeros mingle with casual chit-chat. Datatopics Unplugged is your go-to spot for relaxed discussions around tech, news, data, and society. Dive into conversations that should flow as smoothly as your morning coffee (but don't), where industry insights meet laid-back banter. Whether you're a…
  continue reading
 
A bug in Apple devices lets children visit X-rated websites, even when parental controls were on. WSJ senior personal-tech columnist Joanna Stern joins host Julie Chang to discuss what the company is doing about it. Plus, some artificial intelligence systems are being trained to read emotions — but are they any good at it? WSJ contributor Lisa Feld…
  continue reading
 
This week, we are joined by Dr. Chris Pierson CEO at Black Cloak, and he is talking about some of the social engineering attacks his team is tracking. Joe's story follows how Microsoft Threat Intelligence has observed the financially motivated cybercriminal group Storm-1811 misusing the client management tool Quick Assist in social engineering atta…
  continue reading
 
Timestamps: 0:00 i keep hearing drums 0:08 Intel Lunar Lake 1:59 Google privacy, legal execs leave 3:22 Windows 10 getting new features? 5:20 QUICK BITS INTRO 5:25 Nvidia small form factor guidelines 5:59 Google WON'T confiscate your Pixel 6:37 London medical system under cyberattack 7:17 Meta training AI with user data 7:49 Zoom CEO: use AI to ski…
  continue reading
 
Drones, some coloured cardboard, and a piece of tinfoil may be all the kit you need to crash a robot-driven taxi, and a rapper is accused of using Justin Bieber's name to defraud a TV company. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Warning…
  continue reading
 
Randomly Rambling About Random Things, Including the Randomness of Randomware | An Infosecurity Europe 2024 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli WATCH THE VIDEO: https://youtu.be/ccKG5KUdEII ____________________________ Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity P…
  continue reading
 
Plus, TSMC-backed Vanguard and NXP plan $7.8 billion joint venture to build a chip plant in Singapore. And we exclusively report that Amazon is poised to win big from the NBA’s TV broadcast rights deal. Danny Lewis hosts. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy The Wall Street Journal
  continue reading
 
OpenAI insiders describe a culture of recklessness and secrecy. Concerns over Uganda’s biometric ID system. Sophos uncovers a Chinese cyberespionage operation called Crimson Palace. Poland aims to sure up cyber defenses against Russia. Zyxel warns of critical vulnerabilities in legacy NAS products. Arctic Wolf tracks an amateurish ransomware varian…
  continue reading
 
Guests: Don Gibson, CISO, Kinly On LinkedIn | https://www.linkedin.com/in/don-gibson-cyber/ Emma Philpott, CEO, IASME Consortium On LinkedIn | https://www.linkedin.com/in/emphilpott/ ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmaga…
  continue reading
 
Guest: Ian Hill, Director of Information and Cyber Security at Upp Corporation [@getonupp] On LinkedIn | https://www.linkedin.com/in/ian-hill-95123897/ ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPmagazine | https://www.itspmagazine…
  continue reading
 
Moving money has never been easier. We no longer need to go into a bank, fill out a slip, and hand it to a teller to receive our money. We can now transfer money instantly. Scammers are taking advantage of unfamiliar technology to either hack in and take our money or to deceive you into sending it to them yourself. Deciding if the bank is responsib…
  continue reading
 
New York plans to prohibit social media companies from using algorithms to steer content to minors. WSJ reporter Jimmy Vielkind joins host Julie Chang to discuss the state’s new proposed legislation. Plus, WSJ contributor Tomio Geron on the growing popularity of personal-finance apps and ways to protect your data. Sign up for the WSJ's free Technol…
  continue reading
 
"Tornado Notes" Email @ GRC Have I Been Pwned? A new "supply chain" attack vector Another CA in the DogHouse ICQ to shutter its service Steve reviews "Déjà vu" Hide my email Security in Windows SpinRite update A Large Language Model in Every Pot Show Notes - https://www.grc.com/sn/SN-977-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or sub…
  continue reading
 
Welcome to a brand-new episode of On Location with Sean Martin and Marco Ciappelli at Infosecurity Europe 2024 in London. Today, Sean hosts a very special guest, Richard Meeus, Director of Security Technology and Strategy, EMEA at Akamai, who will provide us with valuable insights into cybersecurity resilience and the evolving landscape of distribu…
  continue reading
 
Loading …

Quick Reference Guide