Download the App!

show episodes
 
Cody Sullivan, Saltine’s godson, writes works to be read, performed and listened to and facilitates and performs in works of improvisation. Sullivan is a contributing writer for Cards Against Humanity. While in Chicago he performed at the iO Theater from 2015 to 2019. Saltine is a world renown lecturer, art historian and former financial advisor to the Ford Administration. Due to Sullivan’s crippling social ineptitude, Saltine handles the public and business affairs.
 
Poetry as F*ck is a spoken word podcast, containing three different shows: 'Poets Against Humanity' - a Creative Commons remix of 'Cards Against Humanity' where poets desecrate each others' work in a panel show format. 'Lies, Dreaming' - a digital open mic night based around a theme, with recorded spoken word submitted by listeners. 'Eight Poems That, If You Had To Be Trapped In Some Way For a Prolonged Period Of Time With Little Hope of Rescue, You'd Quite Like to Bring Along For Coping Pur ...
 
Shifting between Earth and Mars, Badge of Infamy focuses on the gripping tale of a former doctor who becomes a pariah due to being temporarily governed by emotion and compassion, rather than complying with the highly regarded rules established by the Medical Lobby. Furthermore, the novel covers numerous topics including justice, brutality, betrayal, ethics, political control, and lobbying. Set in the year 2100, the novel begins with the introduction of its protagonist, Daniel Feldman, an eth ...
 
When you combine two loud mouths, an annoying laugh and no filter, you get this piece of $%^! podcast. You can depend on them to report useless information and give it to you straight up. Featured segments: - F**ckery Of The Week - Masterdebaters ...more to come.
 
Presenting the Manga Raiders Community Happy Hour!!! Or the MR Happy Hour for short. This is where a community of Manga Writers and Artists get together and we talk about...well Manga and Anime. There's reviews, games, challenges, tips for aspiring writers and artists and much more, so if that sounds like your kind of thing then pull up a barstool, crack open a cold one because here, its always Happy Hour!
 
Join us at AMCast every few weeks to discuss... stuff. You know, like the stuff that comes to our mind when we hit record or whats new at the theater or that new show on Netflix. That stuff. We talk about theories and pop culture... and stuff. We have a lot of fun with this podcast and hope you too!
 
Have you ever had an idea for a new product but just didn't know how to get started? If so, then this is the podcast for you! Each week, we highlight a different product entrepreneur who turned a great new idea into a successful new product. You'll hear about their challenges, their triumphs, their ups, and their downs. But, most of all, you'll learn how each guest was able to take nothing more than an idea, and turn it into a viable, marketable product or business. Our guests have been feat ...
 
20 something year old who has overcome several obstacles and life, i like to talk about those things that i have gone through, in a very relaxed chill enviroment, with my cohost a loving boyfriend Dax. New official Co-Host. Music Mondays Being one of the days i upload, and topic tuesdays, where i sit down with my co-host and talk about things we are passoinate about, or find interseting, my podcast is intented for those around my age group who have similiar trouble, so we can learn from and ...
 
Loading …
show series
 
Of all forms of alternative medicine, chiropractic is the one that is most generally accepted. In the UK, for instance, chiropractors are regulated by statute and even have their own ‘Royal College of Chiropractic’. In the US, chiropractic’s country of origin, most chiropractors carry the title ‘doctor’ and many consumers believe they are medically…
 
John M. Janzen's Health in a Fragile State: Science, Sorcery, and Spirit in the Lower Congo (Wisconsin University Press, 2019) offers a granular and insightful view of the state of healthcare services in the Manianga region of the Lower Congo (Democratic Republic of Congo), and examines the extent to which said services are able to improve the heal…
 
Army Cyber Institute Technical Director and Chief of Staff Colonel Stephen Hamilton takes us on his computer science journey. Fascinated with computers since the second grade, Stephen chose West Point after high school to study computer science. Following graduation he moved into the signal branch as it most closely matched his interest in ham radi…
 
Guest Hossein Jazi of Malwarebytes joins us to take a deep dive into North Korea's APT37 (aka ScarCruft, Reaper and Group123) toolkit. On December 7 2020 the Malwarebytes Labs threat team identified a malicious document uploaded to Virus Total which was purporting to be a meeting request likely used to target the government of South Korea. The meet…
 
A new second-stage backdoor has been found in a SolarWinds compromise victim. Those exploiting the now-patched Exchange Server zero days seem to have done so to establish a foothold in the targeted systems. India continues to investigate a Chinese cyber threat to its infrastructure. Misconfigured clouds leak mobile app data. A major airline IT prov…
 
Today on New Books in History, Dr. Evan Friss, associate professor of history at James Madison University in Harrisonburg, Virginia in the US to talk about The Cycling City: Bicycles and Urban America in the 1890s (University of Chicago Press, 2015). This book was originally released in 2015 by the University of Chicago press and we are chatting on…
 
Indian authorities say October’s Mumbai blackout was “human error,” not cybersabotage. CISA directs US civilian agencies to clean up Microsoft Exchange on-premise vulnerabilities. More effects of the Accellion FTA supply chain compromise. Some trends in social engineering. Andrea Little Limbago brings us up to date on the RSA supply chain sandbox. …
 
Today I talked to Ming-Hui Huang about her book (coauthored with Roland T. Rust), The Feeling Economy: How Artificial Intelligence Is Creating the Era of Empathy (Palgrave MacMillan, 2021) This episode covers the movement of the economy from brawn to brains to hearts. Put another way, the focus here is on the movement from the Physical Economy (far…
 
Listen to this interview of Bill Cope and Mary Kalantzis, creators of the website newlearningonline.com and also professors at the College of Education, University of Illinois. We talk about monastic instruction in the sixth century, we talk about textbook learning in the sixteenth century, and we talk about cybersecurity education in the twenty-fi…
 
India continues to investigate the possibility of RedEcho cybersabotage of its power distribution system, but says any hack was stopped and contained. Microsoft issues an out-of-band patch against a Chinese-run “Operation Exchange Marauder.” The financial sector works to contain an Ursnif outbreak. CISA issues ICS security advisories. Myanmar and t…
 
An exposé of the corruption of medicine by the pharmaceutical industry at every level, from exploiting the vulnerable destitute for drug testing, through manipulation of research data, to disease mongering and promoting drugs that do more harm than good. Authors, Professor Jon Jureidini and Dr Leemon McHenry, made critical contributions to exposing…
 
Alzheimer’s disease, a haunting and harrowing ailment, is one of the world’s most common causes of death. Alzheimer’s lingers for years, with patients’ outward appearance unaffected while their cognitive functions fade away. Patients lose the ability to work and live independently, to remember and recognize. There is still no proven way to treat Al…
 
Indian authorities continue to investigate the possibility that Mumbai’s power grid was hacked last October. Apple’s walled garden’s security can inhibit detection of threats that manage to get inside. An Atlantic Council report recommends international action against access-as-a-service brokers to stall proliferation of cyber offensive tools. Ben …
 
Chinese cyber engagement with Indian critical infrastructure is reported: the objective isn’t benign from India’s point of view, but exactly what the objective is, specifically, remains a matter of speculation. The US Governemnt declassifies its report on the murder of Saudi journalist Jamal Khashoggi. The SolarWinds supply chain compromise remains…
 
Head of Product for IBM Security Aarti Borkar shares her journey which included going after her lifelong love of math rather than following in her parents' footsteps in the medical field. In following her passions, Aarti found herself studying computer engineering and computer science, and upon taking a pause from her studies, she found a niche wor…
 
Guest Maurits Lucas from Intel471 joins us to discuss his team's research into cybercrime in China. Data from Intel 471 show that the Chinese cybercrime underground proliferates through use of common methods or platforms, but behaves differently in large part due to the caution that actors take with regard to their identity. While the average citiz…
 
Oxford biology lab hacked. A Zoom impersonation phishing campaign afflicts targets in the EU. Senators disappointed in Amazon’s decision not to appear at this week’s SolarWinds hearing. NSA advocates adopting zero trust principles. CISA issues alerts on industrial control systems. The US Department of Homeland Security describes increases to its cy…
 
Ronald Deibert is a professor of Political Science at the University of Toronto and the Director of The Citizen Lab, a public interest research organization that uncovers privacy and human rights abuses on the internet. In his latest book, Reset: Reclaiming the Internet for Civil Society (House of Anansi Press, 2020), Deibert unites a growing corpu…
 
Digital dualism, or a sharp division between online and offline activity as "virtual" or "real" has long been a feature of liturgical studies and discussions around worship gatherings for theorists and practitioners alike. Teresa Berger's new book @Worship: Liturgical Practices in Digital Worlds (Routledge, 2017) provides a manifesto for more nuanc…
 
FriarFox is a bad browser extension, and it’s interested in Tibet. Ukraine accuses Russia of a software supply chain compromise (maybe Moscow hired Gamaredon to do the work). Egregor hoods who escaped recent Franco-Ukrainian sweeps are thought responsible for DDoS against Kiev security agencies over the weekend. A look at Babuk, a new ransomware-as…
 
Would your dog eat you if you died? What are face mites? Why do clowns creep us out? In this illuminating collection of grisly true science stories, journalist Erika Engelhaupt, the writer of National Geographic’s highly acclaimed Gory Details blog, shares the answers to these questions and many more. Gory Details: Adventures from the Dark Side of …
 
As more organizations are affected by the Accellion FTA compromise, authorities issue some recommendations for risk mitigation. Ocean Lotus is back, and active against Vietnamese domestic targets. LazyScripter is phishing with COVID and air travel lures. SolarWinds hearings include threat information, exculpation, and calls for more liability prote…
 
Based on a viral article, the gripping medical mystery story of Ron Davis, a world-class Stanford geneticist who has put his career on the line to find the cure for chronic fatigue syndrome, the disease killing his son. For the past six years, Whitney Dafoe has been confined to a bedroom in the back of his parents' home, unable to walk, to eat, to …
 
It’s hard to avoid innovation these days. Nearly every product gets marketed as being disruptive, whether it’s genuinely a new invention or just a new toothbrush. But in this manifesto on the state of American work, historians of technology Lee Vinsel and Andrew L. Russell argue that our way of thinking about and pursuing innovation has made us poo…
 
Ukrainian security services complain of DDoS from Russia. The Accellion compromise is attributed to an extortion gang. Digital Shadow tracks the rise of initial access brokers, new middlemen in the criminal-to-criminal market. A botmaster uses an agile C2 infrastructure to avoid takedowns. IT executives to appear at US Senate hearings on Solorigate…
 
Facebook takes down Myanmar junta’s main page. APT31 clones Equation Group tools. Silver Sparrow’s up to...something or other. Bogus Flash Player update serves fake news and malware. Effects of supply chain compromises spread. Clubhouse’s privacy issues. VC firm breached. CrowdStrike releases its annual threat report. We welcome Josh Ray from Accen…
 
Can your zip code predict when you will die? Should you space out childhood vaccines? Does talcum powder cause cancer? Why do some doctors recommend e-cigarettes while other doctors recommend you stay away from them? Health information―and misinformation―is all around us, and it can be hard to separate the two. A long history of unethical medical e…
 
High Performance Computing Systems Administrator at Brigham Young University Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed this potential and a thirst for learning. He is currently pursui…
 
Guest Bojan Zdrnja of Infigo IS and a certified instructor at SANS Institute shares an incident he discovered where attackers were using a pretty novel way of exfiltrating data and using that channel for C&C communication. The code that was acquired was only partially recovered, but enough to indicate powerful features that the attackers were (ab)u…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login