Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Arvid Kahl talks about starting and bootstrapping businesses, how to build an audience, and how to build in public.
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
Learn the latest life hacking updates in the tech world.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
TV Tech Guy Rich DeMuro offers tech news, gadget reviews, helpful apps and answers your questions. richontech.tv
…
continue reading
Monday through Friday, Marketplace demystifies the digital economy in less than 10 minutes. We look past the hype and ask tough questions about an industry that’s constantly changing.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
This Week in Tech is the top-ranked flagship tech podcast from TWiT.tv. Every Sunday, Leo Laporte and a roundtable of insiders explore the week's hottest tech news from AI to robots, and PCs to privacy. When it comes to tech, TWiT is IT. Records live every Sunday at 5:15pm Eastern / 2:15pm Pacific / 21:15 UTC.
…
continue reading
ITSPmagazine Podcast Network Broadcasting Ideas. Connecting Minds. A Modern Innovative Multi-Media Platform. A Globale Space Where Intellectual Exchange Is Encouraged. Musing on: Technology | Cybersecurity | Society & Culture | Business | Space | Science | Leadership | Environment | Healthcare & Wellness | Storytelling & Storytellers | Artificial Intelligence & Generative AI | Ethics & Philosophy | Policy & Regulations | Hacking | Software Development | Sociology & Psychology | Founders & St ...
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
If you’re looking to understand the business of cybersecurity, then Business Security Weekly is your show! Matt Alderman, Jason Albuquerque, and Ben Carr cover cybersecurity for senior managers and executives, including business challenges, leadership, and communications! Our special guests provide unique perspectives on real problems and solutions to help organizations secure their environments effectively. Learn how to build your cybersecurity program, solve real problems, learn leadership ...
…
continue reading
Podcast by RailsFactory
…
continue reading
This podcast covers all things technology and engineering in Cyprus. The host, Andreas Lefkatis, talks with his guests about what’s trending in their field, innovative ways they’re using technology to make the island a prominent technology hub, and much more. Hopefully it inspires you to do the same! The episodes are available on all major podcast platforms and on our Youtube channel.
…
continue reading
"What the Hack with Adam Levin" is the award-winning weekly true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Tech-Hack's podcast By Nyce Saouth it's 30 min of the best Underground sounds of the world, every week ! Join us on Facebook : http://www.facebook.com/#!/pages/Nyce-Saouth/75758301620
…
continue reading
I sit down every week with the most based people in crypto. My goal is to create a safe space to have the deepest and most real conversations with the biggest builders and investors in the industry, as well as to help educate the mainstream people, politicians, celebrities and big Web2 entrepreneurs coming into Web3. Hopefully this platform does its little part in onboarding as many people as possible into the incredible world of opportunities that Web 3 offers, while staying true to crypto’ ...
…
continue reading
Hackaday Editors take a look at all of the interesting uses of technology that pop up on the internet each week. Topics cover a wide range like bending consumer electronics to your will, designing circuit boards, building robots, writing software, 3D printing interesting objects, and using machine tools. Get your fix of geeky goodness from new episodes every Friday morning.
…
continue reading
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
…
continue reading
It's not just Google. This Week in Google hosts, Leo Laporte, Jeff Jarvis, and Paris Martineau, cover all of Big Tech every Wednesday. Listeners tune in for thought-provoking and entertaining conversations about AI, Internet memes, the future of media, and the latest emerging tech. You won't want to miss a minute. Records live every Wednesday at 5:00pm Eastern / 2:00pm Pacific / 21:00 UTC.
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Machines Like Us is a technology show about people. We are living in an age of breakthroughs propelled by advances in artificial intelligence. Technologies that were once the realm of science fiction will become our reality: robot best friends, bespoke gene editing, brain implants that make us smarter. Every other Tuesday Taylor Owen sits down with the people shaping this rapidly approaching future. He’ll speak with entrepreneurs building world-changing technologies, lawmakers trying to ensu ...
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
The POLITICO Tech podcast is your daily download on the disruption that technology is bringing to politics and policy. From AI and the metaverse to disinformation and microchips, we explore how today’s technology is shaping our world — and driving the policy decisions, global rivalries and industries that will matter tomorrow.
…
continue reading
The Hack Podcast, straight-talk smart tech. Leon McQuade, Paul Longely and Dean Bulfeild bring a leader’s eye over technology drivers shaping the world back to East Yorkshire. We now live in a dazzling world of screens that continues to revolutionise how we live, work and play. The futures arriving faster than ever before, it's time to Think Different. We talk transformation and change focusing on People, Process and Technology. Originally Inspired By Pete Lindsay and Mark Bawden's Book “Pig ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Movies. Music. Games. Tech. Life.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
1
HN38 - Is Your Tap-to-Pay Secure? The Latest Android Malware Warning
13:35
13:35
Play later
Play later
Lists
Like
Liked
13:35
Is Your Tap-to-Pay Secure? The Latest Android Malware Warning 🔒 In this episode of Exploit Brokers, we dive deep into a new Android malware that targets NFC technology to steal your banking information. 📱💳 If you use tap-to-pay or any NFC-based service, this is something you NEED to know. We’ll break down how this malware works, why it's so dangero…
…
continue reading
1
With campaign hacks, Iran takes a page from Russia’s playbook
13:41
13:41
Play later
Play later
Lists
Like
Liked
13:41
U.S. intelligence officials have confirmed that Iran was behind the recent cyberattack on former President Donald Trump’s election campaign. Using an approach called spear phishing, hackers sent personalized emails to campaign staff containing malware that allowed them to access private information and then leak it. Déjà vu, right? Javed Ali, a for…
…
continue reading
1
TWiT 994: Time Moves On, but I Don't - Pavel Durov Arrested, Hacking Bikes, Apple Event Rumors
2:43:05
2:43:05
Play later
Play later
Lists
Like
Liked
2:43:05
Pavel Durov Arrested, Hacking Bikes, Apple Event Rumors Martin Shkreli must surrender his Wu-Tang album copies Telegram messaging app CEO Durov arrested in France Elon Musk to the Rescue Tesla purging old blog posts claiming all cars have level 5 automated driving hardware National Public Data Published Its Own Passwords – Krebs on Security Ten add…
…
continue reading
1
AI Hacks, Cybertruck Review & Sonos Issues
1:47:07
1:47:07
Play later
Play later
Lists
Like
Liked
1:47:07
Rich discussed some real life ways to use AI: to help you pick out wine on a menu, choose what to order based on dietary restrictions and even pick ingredients to cook with. Android users in California can now add their ID or drivers license to Google Wallet. Apple Wallet support is coming soon. Richard in New Jersey is wondering why the voice volu…
…
continue reading
1
Ann Johnson: Trying to make the world safer. [Business Development] [Career Notes]
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17
Enjoy this special encore episode where we are joined by, Microsoft's Corporate Vice President of Cybersecurity Business Development Ann Johnson brings us on her career journey from aspiring lawyer to cybersecurity executive. After pivoting from studying law, Ann started working with computers and found she had a deep technical aptitude for technol…
…
continue reading
1
How To Find Great People to Work With - UBI & Talent Distribution
9:31
9:31
Play later
Play later
Lists
Like
Liked
9:31
This reminds me of a very similar lesson I learned when hiring in cybersecurity over 20 years: exposing people to training and encouragement makes the stars stand out, but it doesn’t turn everyone into stars. Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X…
…
continue reading
1
U2 at the Sphere, Verizon buys Frontier & Marissa Mayer
1:47:15
1:47:15
Play later
Play later
Lists
Like
Liked
1:47:15
Rich reviews the V-U2 show at the Sphere Las Vegas. David in Fresno is getting pop-up notifications on his screen ever since he visited a certain website. Verizon is buying Frontier for $20 billion in cash. Verizon is also cutting Autopay discounts for customers on older plans. Beware: Bitcoin ATM scams are on the rise. Google Photos has a new “Ask…
…
continue reading
1
What is a Habitable Zone? | Stories From Space Podcast With Matthew S Williams
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37
Host | Matthew S Williams On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams ______________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network ______________________ Episode Notes The term "habit…
…
continue reading
1
Book | The Mango Chronicle: A Journey Through Stories, Memories, and Forgiveness | A Conversation with Ricardo Jose Gonzalez-Rothi | Audio Signals Podcast With Marco Ciappelli
37:54
37:54
Play later
Play later
Lists
Like
Liked
37:54
Guest: Ricardo Jose Gonzalez-Rothi, Author On LinkedIn | https://www.linkedin.com/in/ricardo-gonzalez-rothi/ On YouTube | https://www.youtube.com/@MangoforYou2day _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast On ITSPmagazine | https://ww…
…
continue reading
1
The playbook for outpacing China. [Research Saturday]
26:46
26:46
Play later
Play later
Lists
Like
Liked
26:46
This week, N2K's very own Brandon Karpf sits down with Kevin Lentz, Team Leader of the Cyber Pacific Project at the Global Disinformation Lab, and they discuss the recent threatcasting report "Cyber Competition in the Indo-Pacific Gray Zone 2035." This report, developed using the Threatcasting Method, examines how the U.S. and Indo-Pacific allies c…
…
continue reading
1
Cyber Security Today - Week In Review for the September 7th, 2024
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07
Toronto School Board Hack & Cybersecurity Best Practices: Expert Panel Discussion Welcome to the weekend edition of Cybersecurity Today, hosted by Jim Love! Join our expert panel featuring Terry Cutler from Cyology Labs, David Shipley of Beauceron Security, and special guest Dana Proctor from IBM Security Services Canada. This episode dives into re…
…
continue reading
1
Learning about Identity Week Americas and SIDI HUB Summit | An Identity Week USA 2024 Conversation with Jeff Reich | On Location Coverage with Sean Martin and Marco Ciappelli
24:54
24:54
Play later
Play later
Lists
Like
Liked
24:54
Guest: Jeff Reich, Executive Director, Identity Defined Security Alliance [@idsalliance] On LinkedIn | https://www.linkedin.com/in/jreich/ On Twitter | https://twitter.com/JeffReichCSO ____________________________ Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] On ITSPma…
…
continue reading
1
Week in Review: MFA bypass bust, Airport security SQL, GitHub help malware
24:53
24:53
Play later
Play later
Lists
Like
Liked
24:53
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Justin Somaini, partner, YL Ventures Thanks to our show sponsor, Scrut Automation Scrut Automation allows compliance and risk teams of any size to establish enterprise-grade security programs. Their best-in-class features like process au…
…
continue reading
1
Blizzard warning: Russia’s GRU unleashes new cyber saboteurs.
45:21
45:21
Play later
Play later
Lists
Like
Liked
45:21
Cadet Blizzard is part of Russia’s elite GRU Unit. Apache releases a security update for its open-source ERP system. SonicWall has issued an urgent advisory for a critical vulnerability. Researchers uncover a novel technique exploiting Linux’s Pluggable Authentication Modules. Google’s kCTF team has discloses a critical security vulnerability affec…
…
continue reading
Some Amazon drivers say they can’t even hum along to their favorite tunes. And NFL fans, want to watch every game this season? Be ready to cough up $2,500! Plus, cellphone bans in classrooms and an illegal Navy Wi-Fi dish on a warship!By Kim Komando
…
continue reading
Check out this episode from the SWN Vault, hand picked by main host Doug White! This SDL episode was initially published on August 9, 2017. Doug explains the basics of how IP Addresses work, with help from Doug in an alternate dimension. Beware of the terminator! Show Notes: https://securityweekly.com/vault-swn-20…
…
continue reading
1
Fireside Chat: Bennett Pursell on the OpenSSF Siren Threat Intel Project
30:37
30:37
Play later
Play later
Lists
Like
Liked
30:37
In this session SecurityWeek speaks to Bennett Pursell, Ecosystem Strategist at the Open Source Security Foundation (OpenSSF) about OpenSSF Siren, a community data-sharing initiative aimed at bolstering the defenses of open source projects worldwide. In this fireside chat, Pursell discusses the origins and goals of OpenSSF Siren, exploring transpar…
…
continue reading
1
Ep 287: Raspberry Pi Woes, Blacker than Black, and Printing with Klipper
1:05:14
1:05:14
Play later
Play later
Lists
Like
Liked
1:05:14
Elliot Williams is back from vacation, and he and Al Williams got together to talk about the best Hackaday posts from the last week. Of course, the Raspberry Pi RP2350 problem generated a bit of discussion. On a lighter note, they saw laser lawn care, rooting WiFi devices, and some very black material made from wood. Need more current-sinking capab…
…
continue reading
Welcome to the weird world of web scraping in the AI age, where founders have to protect their data from hungry AI companies but also need to collect information from all kinds of (not so) public APIs. Today, I dive into a particularly confusing situation I am in with Podscan when it comes to scraping and keeping the web free and open. This episode…
…
continue reading
1
Bytes: Week in Review — the X ban, Apple’s AI and airplane Wi-Fi gets upgraded
14:09
14:09
Play later
Play later
Lists
Like
Liked
14:09
If you’re an Apple fan, you probably didn’t miss the speculation surrounding the upcoming iPhone 16 launch event next week. Many expect the tech giant to reveal more about how its artificial intelligence will be integrated into its new hardware. We’ll be digging into that on this week’s Tech Bytes: Week in Review. Plus, airlines are upgrading their…
…
continue reading
1
Ep11: Cyberwarfare takes an ominous turn
1:15:13
1:15:13
Play later
Play later
Lists
Like
Liked
1:15:13
Three Buddy Problem - Episode 11: Russia's notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down 'Doppelganger' network spreading Russian propaganda; CISA's budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chi…
…
continue reading
1
Planned Parenthood cyberattack, DoJ propaganda takedown, Microchip Technology theft
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44
Planned Parenthood suffers cyberattack DoJ propaganda domains takedown Microchip Technology confirms data theft Thanks to today's episode sponsor, Scrut Automation Scrut Automation allows compliance and risk teams of any size to establish enterprise-grade security programs. Their best-in-class features like process automation, AI, and over 75 nativ…
…
continue reading
1
AI - What did you miss this summer? Hasthtag Trending for Friday, September 5th, 2024
13:36
13:36
Play later
Play later
Lists
Like
Liked
13:36
AI Summer Recap: OpenAI's GPT 5, GPT Next, and Beyond Join host Jim Love as he navigates through the major AI and cybersecurity stories that dominated summer 2023. From CrowdStrike's impact on Windows security to OpenAI's tantalizing announcements of GPT 4.0 Omni and the anticipated GPT Next, this episode reflects on the giant strides in AI technol…
…
continue reading
1
Ambition & UBI - Why People Are Working Less
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21
The idea that Universal Basic Income (UBI) reduces the need to work isn't new, but recent studies show it doesn't lead to better jobs or more education. Instead, people just work less. | by Alex Howlett | MORE Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on …
…
continue reading
1
UL NO. 448: TSA SQLi, NYT Github, NK RPM, NVIDIA Mystery...
22:19
22:19
Play later
Play later
Lists
Like
Liked
22:19
Becoming Attention, Weighting on OpenAI, Ozempic and Aging?, and more... ➡ Check out Vanta and get $1000 off: vanta.com/unsupervised Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Follow on LinkedIn: https://www.linkedi…
…
continue reading
1
Snake Oilers: Authentik, Dropzone and SlashID
38:03
38:03
Play later
Play later
Lists
Like
Liked
38:03
In this edition of Snake Oilers Patrick Gray gets pitches from three cybersecurity companies: Authentik, an open source identity provider that a lot of large organisations are deploying on prem as an alternative to cloud-based IDPs Dropzone AI, an LLM-based agent that can do the work of a Tier 1 SOC analyst SlashID, an identity security company tha…
…
continue reading
1
E86: Alliance Founding Partner - The Secret to Winning in Crypto (from a Top Investor)
1:44:59
1:44:59
Play later
Play later
Lists
Like
Liked
1:44:59
Qiao Wang is the Founding Partner AllianceDAO, the leading crypto accelerator & founder community. He is also the coHost of @goodgamepod , the no BS insights podcast for crypto founders. In this conversation, we dive into:-What It Takes To Be a Great Founder and Investor -How To Make it Big in Crypto-Liquid Investing-Why It's Not Hard to Be Great i…
…
continue reading
The DOJ disrupts Russia’s Doppelganger. NSA boasts over 1,000 public and private partners. The FBI warns of North Korean operatives launching “complex and elaborate” social engineering attacks. Iran pays the ransom to sure up their banking system. Cisco has disclosed two critical vulnerabilities in its Smart Licensing Utility. A Nigerian man gets f…
…
continue reading
1
How to Make the World Quantum Safe - Vadim Lyubashevsky - ESW Vault
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10
Check out this episode from the ESW Vault, hand picked by main host Adrian Sanabria! This episode was initially published on April 21 2023. Quantum computers are scaling rapidly. Soon, they will be powerful enough to solve previously unsolvable problems. But they come with a global challenge: fully-realized quantum computers will be able to break s…
…
continue reading
Streaming was supposed to be ad-free, but now ads are sneaking into paid plans, and free ones are packed with them. What happened? Plus, is Facebook listening through your phone? I'll cover that, how tech is making us lonelier, and the latest AI threat.By Kim Komando
…
continue reading
Warning: This episode mentions suicide. If you are in crisis, please call the National Suicide Prevention Lifeline at 1-800-273-TALK (8255). There seems to be growing momentum for efforts to protect kids from online harm. In June, the Surgeon General Vivek Murthy called for a warning label on social media for children, and more recently the Senate …
…
continue reading
1
The Nurturer’s Edge: Empathy-Driven Leadership with GiANT 5 Voices
56:39
56:39
Play later
Play later
Lists
Like
Liked
56:39
Unlocking Leadership Potential with the 5 Voices: Insights from Lydia Jourdain of GiANT London In today's fast-paced business world, understanding and leveraging your leadership strengths is essential for personal and team success. This week on the Think Cloud's Hack Podcast, Leon, Dean, and Paul are joined by Lydia Jourdain, a Partner at GiANT Lon…
…
continue reading
1
Spyware research, Cicada rebrand, MacroPack malware
7:05
7:05
Play later
Play later
Lists
Like
Liked
7:05
Spyware research report They found a way to make Cicadas more annoying MacroPack red teaming tool used for malware Thanks to today's episode sponsor, Scrut Automation Scrut Automation allows compliance and risk teams of any size to establish enterprise-grade security programs. Their best-in-class features like process automation, AI, and over 75 na…
…
continue reading
1
"Active Listening" software reportedly used to listen in on smart phone conversations. Cyber Security Today for Thursday, September 5, 2024
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42
Is Your Phone Spying on You? D Link Vulnerabilities & Government Data Requests In this episode of Cyber Security Today, host Jim Love discusses critical remote code execution vulnerabilities in D Link routers, impacting their discontinued DIR 846 series. These flaws, including CVE 2024 44341 and CVE 2024 44342, pose significant risks, prompting D L…
…
continue reading
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of how the ease of registering an LLC in Colorado has led to a surge in fraudulent businesses. She discusses how residents receiving suspicious mail addressed to fake LLCs registered at their homes are overwhelming the state's Secretary of State with thous…
…
continue reading
1
TWiG 784: Trochilidine Vigor - Elon Relents, Internet Archive Loses, Pennies
2:44:28
2:44:28
Play later
Play later
Lists
Like
Liked
2:44:28
The Internet Archive just lost its appeal over ebook lending Brazil Blocks X After Musk Ignores Court Orders Telegram Founder Pavel Durov's Indictment Thrusts Encryption Into the Spotlight Elon Musk, Tesla (TSLA) Beat Suit Over Promoting Dogecoin 'Pyramid Scheme' America Must Free Itself from the Tyranny of the Penny Did your car witness a crime? B…
…
continue reading
1
The Godfather club, and AirTags to the rescue
54:16
54:16
Play later
Play later
Lists
Like
Liked
54:16
There's a whole new dating scam that could mean you end up out of pocket (or beaten up) after a first date with a glamorous admirer, and a woman in Los Alamos uses an Air Tag to entrap a thief. Plus - don't miss our featured interview with Maya Levine of Sysdig. All this, and a very bad Cockney accent, in the latest edition of the "Smashing Securit…
…
continue reading
1
Hacker Heroes - Mark Loveless - PSW Vault
1:32:39
1:32:39
Play later
Play later
Lists
Like
Liked
1:32:39
Exploring the Hacking Landscape with Mark Loveless, AKA SimpleNomad Dive into the intricate world of cybersecurity with our featured guest, Mark Loveless, widely known by his handle SimpleNomad. With a rich history in the realm of information security, Mark is a seasoned professional, researcher, and thought leader. Mark's journey spans decades, ma…
…
continue reading