show episodes
 
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious, enlightening, and occasionally criminal world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new topic every episode.
 
Hackaday Editors take a look at all of the interesting uses of technology that pop up on the internet each week. Topics cover a wide range like bending consumer electronics to your will, designing circuit boards, building robots, writing software, 3D printing interesting objects, and using machine tools. Get your fix of geeky goodness from new episodes every Friday morning.
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
Thomas Hatch and Jimmy Chunga are The Hacks! Join them every week as they talk about nerd stuff. If you’re into cybersecurity, DevSecOps, SecOps, DevOps, all the Ops, infrastructure automation, network automation, configuration management, and open source then subscribe now. This will be your new favorite podcast! Because we know you’re thinking it...NO, they don’t live in their moms’ basements...this month.
 
TechStuff is a show about technology. And it’s not just how technology works. Join host Jonathan Strickland as he explores the people behind the tech, the companies that market it and how technology affects our lives and culture.
 
DIY Cyber Guy is for anyone that wants to keep hackers out of their computers. The DIY Cyber Guy, David W. Schropfer, interviews with the world's leading cyber security experts to give you easy to understand tips, tactics and tools to protect your invaluable data, and your irreplaceable reputation online.
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Michael Puldy, CEO of Puldy Resiliency Partners, has a thirty plus year career dealing with disasters, crisis’, and crazy adventures. In his business life, he has helped hundreds of companies navigate through business disruption, computer infrastructure failures and data loss, caused by a broad brush of reasons including human mistakes, natural disasters, and all out cyberattacks. Through work, adventure travel, and in everyday life, we face and confront risk every day and in all sorts of un ...
 
Foundering is a new serialized podcast from the journalists at Bloomberg Technology. Each season, Foundering brings you inside a different high-stakes drama from Silicon Valley, where its companies are wielding unprecedented capital and power.
 
https://twitter.com/ADanielHill “In 2014, Alberto Daniel Hill, an expert in cybersecurity, found a security issue in a medical provider’s website. In reporting the issue, it led him to become the first person imprisoned in Uruguay for a computer-related crime—a crime he didn’t commit, and one that probably never even happened. Alberto, a hacker, was the perfect target for a judicial system that doesn’t understand cybersecurity or cybercrimes. Through police misconduct and incompetence, his l ...
 
Hosted by wellness champion and reset expert Dr. Mindy Pelz, The Resetter Podcast explores science-based, tangible and easy to apply practices to help you restore your body’s optimal health settings, just like hitting the reset button on your computer! Dr. Mindy interviews leading health professionals and thought leaders on the topics of fasting, nutrition, ketogenic diet, the microbiome, gut repair, anti-aging, hormones, biohacking, supplements, heavy metal detoxing, functional testing and ...
 
See all the steps for solving tech problems or just getting more out of What you're using. Whether it's a computer tip, tweaks and tricks for your DVR, or ways to get more out of your smartphone, you'll find it in CNET How to. Each video is helpfully rated easy, medium, difficult or supergeek.
 
See all the steps for solving tech problems or just getting more out of What you're using. Whether it's a computer tip, tweaks and tricks for your DVR, or ways to get more out of your smartphone, you'll find it in CNET How to. Each video is helpfully rated easy, medium, difficult or supergeek.
 
What really happens when a hacker snatches all your data? Breach digs into the who, why and how of history’s most notorious data breaches. Hosted by journalist Bob Sullivan and producer Alia Tavakolian. Season 2 - Equifax: the worst breach ever. How hackers stole the most valuable data of 145 million people, why it matters, and what we can do about it.
 
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
 
Learn German with Free Podcasts Whether you are student or a seasoned speaker, our lessons offer something for everyone. We incorporate culture and current issues into each episode to give the most informative, both linguistically and culturally, podcasts possible. For those of you with just the plane ride to prepare, check our survival phrase series at GermanPod101.com. One of these phrases just might turn your trip into the best one ever!
 
Alice has never seen Buffy the Vampire Slayer. Melissa definitely has, and she loves it. Since they're BFFs they decided to watch every episode together and talk about every choker, computer hack, and sassy comeback, along with the million other super not insightful things that pop into their heads.
 
Loading …
show series
 
Photo by Andri from StockSnap Hackers are awful. Let’s be blunt about it. They just plain old suck. What to do about it? Facebook Hack 2021 Well, the be thing is to be pro-active and protect yourself. Listen in as we talk about LD’s issues with Facebook, a lost account, and how the bad guys stole it! https://www.facebook.com/help/285695718429403?he…
 
Since 1953, the DMZ (Korean Demilitarized Zone) separates Korea into two countries. Unique biodiversity has grown between landmines to become a curious lab for researchers interested in Life and Earth sciences, heavy industry, armament, and technology. On the diplomatic scene, the DMZ is the home of the Joint Security Area, a strategic hotspot for …
 
Kim Nguyen talks about her story about what made her want to get into computer science and discusses some of the speed bumps she has encountered during school and how she is doing to prepare her life for success post-college. Kim Nguyen's story illustrates that we all come from a different path when entering the cyber workforce. We all bring a uniq…
 
When the world went fully remote a year ago, many systems had to migrate from on-premise to the cloud. Now that we're starting to re-open offices, do we move these system back to on-premise or is cloud the new normal? Fleming Shi, CTO from Barracuda Networks, joins us to discuss the ongoing challenges of the hybrid workforce. In the Leadership and …
 
This week, Dr. Doug talks naughty vaccines, Air frying is not frying, BGP is leaking, Codecov, Lazarus, Google Alerts, Nitro Ransomware, & we're joined once more for expert commentary by Jason Wood! Show Notes: https://securityweekly.com/swn115 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.t…
 
Now that you know what bots are, where they originate, what good they can do, and the harm they can cause, it's time to understand how to implement a strategy to fight back and contain the damage they can bring. Businesses can be negatively affected by they do not have to. In part 1 of this 2-part series, we explore the source of bots: who writes t…
 
Update on the Codecov supply chain attack. The Babuk gang says they’ve debugged their decryptor. MI5 warns of “industrial scale” catphishing in LinkedIn. Positive Technologies responds to US sanctions. The US stands down the two Unified Coordination Groups it established to deal with the SolarWinds and Exchange Server compromises. Are all Five Eyes…
 
Think of a high school club, and you might think about a group of young students meeting regularly to engage in a common topic. Accurate, but the Del Norte High School's Team Optix 3749 Club builds robots and competes with them. This, and so much more. At its core, the purpose behind Team Optix 3749 is to provide an environment for students to lear…
 
We hear from the leader of a SaaS company that has successfully set up an effective responsible disclosure program (RDP). Tom Kuzler, CEO of email marketing platform is no stranger to this crucial relationship with the security research community, and walks us through how an RDP has worked for his company. You'll learn: why it's important to set up…
 
This week, we welcome Doug Barbin, Managing Partner at Schellman & Company, LLC, to discuss Supply Chain Management! Supply chain security isn't new, despite the renewed attention from the Solar Winds attack. It has old challenges, like having an accurate asset or app inventory, and new opportunities, like Software Bill of Materials. From consequen…
 
A lot can be done by CSOs/CISOs to maximize value and reduce risks when working with PR/media. However, the path forward is not always straightforward. What are the common hiccups, screw-ups, and give-ups? As part of our ongoing "CISO functional relationships" series, in today's episode, we look at the role of PR and the media as a function of esta…
 
Another supply chain incident surfaces. The Natanz sabotage seems to have landed a punch, but not a knock-out blow against Iran’s nuclear program (and it appears to have been a bomb). China’s “big data” gangs and their place in the criminal economy. Tolerating (and protecting?) ransomware gangs in Russia? Betsy Carmelite looks at the intersection o…
 
The third-party ecosystems of today’s organizations have become more complex, more digital, and more extensive than ever before. The need for an accurate picture of your vendor’s security posture is greater than ever, with public and private sector organizations reporting a surge in cyber-attacks, and at the same time, continuing to experience and …
 
// R E A D Y • S E T • R E S E T This episode is all about your hormonal needs depending on your reproductive cycle. Our lifestyle should be matched to these hormonal needs! Dr. Stephanie Estima is a chiropractic doctor with a particular interest in metabolism, body composition, functional neurology, and female physiology. She's been featured on Th…
 
Risto Miikkulainen is a computer scientist at UT Austin. Please support this podcast by checking out our sponsors: – The Jordan Harbinger Show: https://jordanharbinger.com/lex/ – Grammarly: https://grammarly.com/lex to get 20% off premium – Belcampo: https://belcampo.com/lex and use code LEX to get 20% off first order – Indeed: https://indeed.com/l…
 
Xi Jinping har återintroducerat repressionen av det kinesiska folket på en skala som vi inte har sett sedan Mao Tse-Tungs dagar. Men samtidigt har Xi Jinpings Kina nått längre än något annat land i världen när det gäller att omfamna möjligheterna som informationsteknologin, utvecklingen av artificiell intelligens och big data ger. Många som är intr…
 
CEO and Founder of Votiro Aviv Grafi shares his story from serving as a member of the IDF's intelligence forces to leading his own venture. Aviv says his service in the IDF shaped a lot of his thinking and problem solving. Following his military service, Aviv worked to gain more real world and business experience. Starting his own business as a pen…
 
Robert Breedlove is a decentralized finance entrepreneur, philosopher, and podcaster. Please support this podcast by checking out our sponsors: – Fundrise: https://fundrise.com/lex – LMNT: https://drinkLMNT.com/lex to get free sample pack – Munk Pack: https://munkpack.com and use code LEX to get 20% off – BetterHelp: https://betterhelp.com/lex to g…
 
Guest Deepen Desai joins Dave to talk about Zsaler's research "Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures." In Jan 2021, Zscaler ThreatLabZ discovered new instances of the MINEBRIDGE remote-access Trojan (RAT) embedded in macro-based Word document files crafted to look like valid job resumes (CVs). Such lures are often …
 
The European Union expresses solidarity with the US over the SolarWinds incident. The UK joins the US in attributing the incident to Russia. Russia objects to US sanctions and hints strongly that it intends to retaliate. IBM discloses new cyber threats to the COVID-19 vaccine cold chain. Iran says Natanz is back in business. Kevin Magee from Micros…
 
In this episode JJ and Dexter Ang explore the latest in gesture control using human machine interfaces and talk about how this technology can help us all to live our best life. Drawing on his expertise in Human Computer Interaction and mechanical engineering, Dexter leads the development of the next generation of patented nerve-sensing electroneuro…
 
* I catch up with tech expert Amber Mac about ‘green tech,” including ways to conserve water and save electricity – ahead of Earth Day. * Learn about the Pinterest ‘Creator Code,’ a mandatory set of guidelines that focus on kindness, inclusivity and compassion * Xandar Kardian has a radical new smart home device, the XK300. Hear what it does in our…
 
Is scraping the same as hacking or just an example of “zealous” use of a social media platform? And if it isn’t considered hacking…should it be? As more and more online platforms open their doors to API-based access, do we need more rules and oversight of how APIs are used to prevent wanton abuse? The post Episode 211: Scrapin’ ain’t Hackin’. Or is…
 
John Jackson is a Senior Application Security Engineer by day and security researcher and hacker advocate in his spare time. John discusses his path into application security and hacking. He discusses how hackers should not be viewed as the bad guys and are the truly heroes. Guest John Jackson, Founder of Sakura Samurai (@johnjhacking on Twitter) H…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login