Tales of supernatural horror and suspense, old and new, are brought to life in this series of audio narrations enhanced with spinetingling music and sound effects. Featuring stories by acknowledged masters of the genre like M. R. James, E. F. Benson and H. P. Lovecraft, alongside lesser-known authors of the early 20th century waiting to be rediscovered and contemporary talents, The EnCrypted Horror Podcast is your new home for horror, curated, read and produced by Jasper L'Estrange. Subscrib ...
…
continue reading
Encrypted Podcasts
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
The world’s most controversial events, and the complex beliefs behind them. From Bigfoot sightings to bitcoin takeovers, alien landings to assassinations, who’s shaping the narrative — and why? Conspiracy Theories is a Spotify Podcast. New episodes Wednesdays. Watch episodes and more on YouTube: www.youtube.com/@ConspiracyTheoriesPodcast
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Scramblex.com has released a free encryption service that will protect sensitive data from unauthorised access and the potential for identity or financial theft.
…
continue reading
Exploring the ideas and stories of crypto moguls from around the world. Learn more at cryptonews.com
…
continue reading
Techlore Talks brings you in-depth conversations with the experts at the forefront of privacy, security, and digital rights. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode features meaningful discussions with the people building, researching, and advocating for digital freedom. From cybersecurity researchers and privacy tool developers to open-source advocates and digital rights activists—if they're shaping how we protect ourselves online, the ...
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
…
continue reading
1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
…
continue reading
The officially unofficial podcast for Mr. Robot on USA. Each week we hack into the episode with a full recap and listener feedback.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Venture into the elusive world of intelligence collection and espionage to spot, assess and debrief: spies, handlers, catchers, analysts, cut-outs, dangles, diplomats, security experts and the storytellers who bring them all to life. Check your electronics and subscribe, do a thorough surveillance detection route, secure your Live Drop location, and after a mad-minute introduction, listen in on conversations with our fascinating guests who help to illuminate a complex universe. A HUMINT expe ...
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
A new beginning in IT
…
continue reading
Interviews with users, hackers, and staff of America Online (AOL), covering the 90’s/Early 2000’s.
…
continue reading
Discover the future of digital privacy with ZeroID — featuring a secure chat app, secure eSIM, and encrypted eSIM technology with no KYC or surveillance. Learn how to stay anonymous, connected, and in control using crypto-powered tools built on Solana.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
A series of shortcasts from the Internet Watch Foundation (IWF) about their leading non-profit work tackling online child sexual abuse. Our series of short podcasts feature discussions with leading experts and academics covering a wide variety of topics including tech, encryption, policy and how these impact the criminal circulation of child sexual imagery online. Find out more at iwf.org.uk
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Current content form the PC World Magazine
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Inside Policy Talks is the premier video podcast of the Macdonald-Laurier Institute, Ottawa's most influential public policy think tank. The Macdonald-Laurier Institute exists to make bad public policy unacceptable in our nations capital.
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
David Bombal interviews people in the networking world to learn about life, hacks, technology and networking and ways to improve your life!
…
continue reading
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
Microsoft confirms bug with encrypted emails in classic Outlook app.
…
continue reading
Asked whether he’s ever experienced the sensation of “the other man on the rope”, seasoned mountaineer Sir Andrew Poursuivant regales his companion Bill with a story of a harrowing ascent up the Dent du Géant…a climb that has haunted him ever since.This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE THIR…
…
continue reading
What video doorbells see (and what they dont): Heres what you can expect.
…
continue reading
Best Chromebooks 2025: Top picks for work, school, and more.
…
continue reading
MSI Aegis, Vision, and new MEG X monitors make a splash at CES 2026.
…
continue reading
Ankers fast 6-port USB charging station is a winner at 25% off.
…
continue reading
This hidden Windows 11 trick unlocks SSD speed boost for NVMe drives.
…
continue reading
1
Smarter Displays, Faster Mini PCs, AI Everywhere: MSI Is Redefining Professional Performance at CES 2026.
Smarter Displays, Faster Mini PCs, AI Everywhere: MSI Is Redefining Professional Performance at CES 2026.
…
continue reading
All Microsoft 365 users will need to activate MFA soon, or else.
…
continue reading
Logitechs G502 Hero wired mouse is a champion and now 49% off.
…
continue reading
Prominent leaker reveals Nvidias RTX 6000 series launch date.
…
continue reading
LGs 27-inch 1440p 240Hz monitor is a whopping 45% off on Amazon.
…
continue reading
Lenovos 17-inch RTX 5050 gaming laptop is only $850 right now.
…
continue reading
Kingston Dual Portable flash drive review: Competitive performance, dual connectors.
…
continue reading
Stop falling for mAh: Your 20,000mAh power bank isnt 20,000mAh.
…
continue reading
Lenovo swings big at CES 2026 with weird and experimental designs.
…
continue reading
Disable Windows updates to more precisely control your PC.
…
continue reading
Z-Wave Alliance touts newly certified Z-Wave Long Range devices.
…
continue reading
Aiper Brings a Smarter Yard Ecosystem to CES 2026.
…
continue reading
The PC let its freak flag fly at CES despite the RAM crunch.
…
continue reading
TDM unveils headphones that twist into a portable Bluetooth speaker.
…
continue reading
Save 57% on lifetime access to 1TB of easy cloud storage.
…
continue reading
The 10 best PC monitors at CES 2026.
…
continue reading
1
SANS Stormcast Friday, January 9th, 2026: Gephi Analysis; zlib vuln; GnuPG Vulns; Cisco/Cloudflare DNS Issue
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12Analysis using Gephi with DShield Sensor Data Gephi is a neat tool to create interactive data visualizations. It can be applied to honeypot data to find data clusters. https://isc.sans.edu/diary/Analysis%20using%20Gephi%20with%20DShield%20Sensor%20Data/32608 zlib v1.3.1.2 Global Buffer Overflow in TGZfname() of zlib untgz Utility The untgz utility …
…
continue reading
1
Garett Jones: Yes, immigration DOES change host countries
47:45
47:45
Play later
Play later
Lists
Like
Liked
47:45Immigration has long been described as simply a net positive, and debated solely in economic terms – like jobs, wages, and GDP. But after decades of immigration from different parts of the world – with newcomers now making up increasingly large shares of the population in Canada, the United States, and other Western countries – people are starting …
…
continue reading
The US withdraws from global cybersecurity institutions. A maximum-severity vulnerability called Ni8mare allows full compromise of a workflow automation platform. Cisco patches ISE. Researchers uncover a sophisticated multi-stage malware campaign targeting manufacturing and government organizations in Italy, Finland, and Saudi Arabia. The growing r…
…
continue reading
AMD talks FSR Redstone plans, Linux support, and AI bundle.
…
continue reading
How ATSC 3.0 aims to win over cord-cutters in 2026.
…
continue reading
This 16-inch 2K portable laptop monitor is worth it at 30% off.
…
continue reading
The official launch date for Windows 11 26H1, confirmed.
…
continue reading
No fans.
…
continue reading
Microsoft Edge is getting a Copilot-style makeover, even if you dont use AI.
…
continue reading
Bose goes open source with its aging SoundTouch speakers.
…
continue reading
TikTok-style vertical videos are coming to Disney+.
…
continue reading
Get this 4-pack of AirTag alternative trackers for $5 a piece.
…
continue reading
Best of CES 2026: The smart home & home security gear edition.
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/wrapping-up-trends-in-macos-malware-of-2025. The myth of a malware-free Mac is a thing of the past. Here’s how Mac threats evolved in 2025 — and what’s coming next. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check e…
…
continue reading
1
I Saw a Phishing Site That Traps Security Bots
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26This story was originally published on HackerNoon at: https://hackernoon.com/i-saw-a-phishing-site-that-traps-security-bots. How modern phishing kits use honeypots, cloaking, and adversary-in-the-middle attacks—and how defenders can turn those same tactics against them. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybers…
…
continue reading
Score 2 super-fast USB-C charging cables for just $9 right now.
…
continue reading
AMD claps back at Intel claims that it uses ancient silicon in PC gaming handhelds.
…
continue reading
Save $451 on this Asus gaming laptop with Ryzen 9 and RTX 5070 today.
…
continue reading
TP-Links Tapo family gains 3 high-resolution security cameras.
…
continue reading
Best of CES 2026: The tech gear and PC innovations that blew us away.
…
continue reading
Nvidia, AMD consider reviving old chips to combat soaring PC costs.
…
continue reading
Transfer to your new PC the lazy way this $34.99 bundle does all the work.
…
continue reading
Seeing means believing for Nvidias new DLSS 4.5 and G-Sync Pulsar monitors.
…
continue reading
Googles Gmail just got a big AI upgrade and its (mostly) free.
…
continue reading
CES debuts a HyperX-branded gaming headset that you can control with your brain.
…
continue reading
1
#507: Carlos Lei, CEO of Uplink, on The Future of Connectivity, Mesh Networks, Building on Avalanche, and DePIN in 2026
27:34
27:34
Play later
Play later
Lists
Like
Liked
27:34Carlos Lei, CEO of Uplink, one of the leading DePIN players, operates as a connectivity marketplace using existing Wi-Fi routers to help telecom companies save millions of dollars. In this conversation, we discuss: - 2026 will be the year of DePIN - Insights from building in connectivity since 2015 - The future of connectivity - Mesh networks - Sha…
…
continue reading
1
SANS Stormcast Thursday, January 8th, 2026: HTML QR Code Phishing; n8n vulnerability; Powerbank Feature Creep
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23A phishing campaign with QR codes rendered using an HTML table Phishing emails are bypassing filters by encoding QR codes as HTML tables. https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table/32606 n8n vulnerabilities In recent days, several new n8n vulnerabilities were disclosed. Ensure that …
…
continue reading