Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
IDEAS is a place for people who like to think. If you value deep conversation and unexpected reveals, this show is for you. From the roots and rise of authoritarianism to near-death experiences to the history of toilets, no topic is off-limits. Hosted by Nahlah Ayed, we’re home to immersive documentaries and fascinating interviews with some of the most consequential thinkers of our time. With an award-winning team, our podcast has proud roots in its 60-year history with CBC Radio, exploring ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
A new beginning in IT
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Listen to articles handpicked by our editors, and stay updated on top technology news from TechCrunch.
…
continue reading
We Cover the Cyberspace.
…
continue reading
A ten-minute weekly audio update in English of what's happening in Poland. No ads. If you enjoy the show, you can support us by buying a shirt here: https://rorshok.com/buy/ Learn more about the Rorshok Updates here: https://rorshok.com/ Thank you!
…
continue reading
FRONTLINE Editor-in-Chief and Executive Producer Raney Aronson-Rath sits down with journalists and filmmakers for probing conversations about the investigative journalism that drives each FRONTLINE documentary and the stories that shape our time. Produced at FRONTLINE’s headquarters at GBH in Boston and powered by PRX. The FRONTLINE Dispatch is made possible by the Abrams Foundation Journalism Initiative.
…
continue reading
Tech news and opinion from an angry programmer with a microphone
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
50,000 watts of gearhead terror. We’re the talk radio blowtorch you want, chock-full of cars, trucks, beers and guns since 2009. We'll be your go-to for gearhead get-some, full of the sliciest canyon carving, dirtiest off-roading, biggest calibers, hairiest sasquatches, loudest explosions, plus the best epic fails, smoking rubble and blue-collar awesomesauce since Top Gear full of beer.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Cybersecurity, Startups & Artificial Intelligence... but fun. Welcome to a place where hacking meets humor, AI meets absurdity, and your online safety might just be saved by a bad meme. We live in a world where your fridge can spy on you, your toaster has a firmware update, and a Nigerian prince still wants your money – but now through ChatGPT. It’s wild out there. This podcast arms you with the knowledge to survive and thrive in today’s tech jungle. You’ll get practical tips, real-world sto ...
…
continue reading
We discuss about the way to increase traffic
…
continue reading
Welcome to the Global Intelligence Knowledge Network Podcast, where real-world intelligence expertise meets insightful analysis. Join your host, Neil Bisson, a former Intelligence Officer with the Canadian Security Intelligence Service, for a weekly deep dive into the world of espionage, national security, foreign interference, terrorism, and all matters spy and intelligence related. With over 25 years of experience in intelligence and law enforcement, both domestically and internationally, ...
…
continue reading
Black Hat Digital Self Defense. Black Hat provides cutting edge content in the information and computer security field. Keep up to date with Black Hat presentations, announcements, and free content.
…
continue reading
The podcast where academics and plebs critically discuss representations of fascism and anti-fascism in modern cinema. Hosted by Tenzan Eaghll and Nathan Litwin. Let's get critical!
…
continue reading
Margo Cruz, the host of Tech Law Tracker, keeps up with new state-level regulations of the internet to find out how state laws are shaping the development and use of technology.
…
continue reading
Protecting your privacy from identity theft, fraud, and cyber threats is easy with a Privacy Mentor. Get the latest on threats, tools, and tips to staying safe in the digital age. Tune in weekly.
…
continue reading
I’m Anthony Desnos, a security engineer specializing in Android apps and malware analysis. Date of birth: 18/02/1985 Web: https://anthonydesnos.com/ Address: 4117 David Dr, CA California, US Gmail: [email protected] Social: https://gravatar.com/anthonydesnos522 https://www.facebook.com/anthonydesnos/ https://www.instagram.com/anthonydesnos552/ https://x.com/AnthonyDes19261 https://www.reddit.com/user/Crazy-Mousse-4053/ https://www.scoop.it/u/anthonydesnos522-gmail-com https://www.pi ...
…
continue reading
The phone hacking scandal that closed News of the World was big, but that was just the tip of the iceberg. At the bottom of that iceberg of 'dark arts' - hacking, burglary, bugging, and bribing bent cops - is the body of Daniel Morgan. It’s been described by an Assistant Commissioner of the Metropolitan Police as “one of the most disgraceful episodes in the entire history of the Metropolitan Police Service.” Over the three decades since Daniel was killed, five failed police investigations an ...
…
continue reading
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
…
continue reading
“Views on First” is the Knight First Amendment Institute’s flagship podcast. Each season, we invite leading legal scholars, practitioners, tech policy experts, and others to join us in conversations about some of the most pressing First Amendment issues in the ever-shifting expressive landscape of the digital age. “Views on First: Season 1” won a 2024 Anthem Award Silver Medal and 2023 Signal Listener’s Choice Award and a Signal Silver Medal.
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
…
continue reading
Android Spyware Disguised as Alpine Quest App Targets Russian Military DevicesBy Carl Franklin
…
continue reading

1
Trojan Map App: Spyware Targets Russian Soldiers via Alpine Quest
9:14
9:14
Play later
Play later
Lists
Like
Liked
9:14A newly discovered Android spyware campaign is targeting Russian military personnel by weaponizing a popular mapping app. Disguised as a cracked version of Alpine Quest Pro, this trojanized app delivers Android.Spy.1292.origin—a powerful surveillance tool that steals data, tracks location in real-time, and downloads secondary payloads to extract co…
…
continue reading

1
Risky Bulletin: Russian military personnel targeted with Android spyware
6:09
6:09
Play later
Play later
Lists
Like
Liked
6:09Russian military personnel targeted with Android spyware, Trump defends Hegseth after second Signalgate scandal, CISA’s Secure by Design leaders depart the agency, and forced-labour cyber scam compounds expand globally. Show notes
…
continue reading

1
03.14.25 (MP3): Bolts & Fasteners, Ammo & Peppers, NASCAR & Electrics, Teslas & Politics, Crazies & Customers, Re-Gippers & Pinkos, Tools & Leverages, Spyware & Static, Clocks & Waves, + the Visceral Satisfaction ...
59:50
59:50
Play later
Play later
Lists
Like
Liked
59:50With the throwback gratification of Failure's "Fantastic Planet" rolling throughout, the gearhead goons at the Garage Hour start out gritty with the bucket (or well-sorted trays) of backup bolts that every good geek has in the garadtch. Note: if that pile of bolts (and rags, and parts, and tools) is getting dusty, you're not making enough - time to…
…
continue reading

1
Spyware abusers can easily hack your phone and surveil you
54:08
54:08
Play later
Play later
Lists
Like
Liked
54:08We are all vulnerable to digital surveillance, as there’s little protection to prevent our phones from getting hacked. Mercenary spyware products like Pegasus are powerful and sophisticated, marketed to government clients around the world. Cybersecurity expert Ron Deibert tells IDEAS, "the latest versions can be implanted on anyone's device anywher…
…
continue reading
Feel like someone knows everything about you? You could have a lurker on your phone.By Kim Komando
…
continue reading

1
Cheap Pegasus #spyware for everyone! #NoviSpy
23:08
23:08
Play later
Play later
Lists
Like
Liked
23:08🎺 How did the Serbians utilize Israeli software – paid for by the Norwegians via the UN – to spy on Serbian journalists and activists?Because the Balkans are burning once again. And even though we might be used to that, this time something truly inexplicable happened. Not to be outdone by us, the Serbians got a Pegasus of their own. And „their own”…
…
continue reading

1
Governments identify dozens of Android apps bundled with spyware
3:08
3:08
Play later
Play later
Lists
Like
Liked
3:08The advisories say the spyware apps are used to target members of civil society who may oppose China’s state interests. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading
Motorola unveiled a completely new Razr flip phone. But this time, the phone comes with Perplexity A.I. baked in.By Kim Komando
…
continue reading
Ever post a pic online? There's a good chance it was scraped and added to an AI dataset. Check this site to find out.By Kim Komando
…
continue reading
Two teens started flipping discarded items from landfills. Now they run a seven-figure resale business.By Kim Komando
…
continue reading
Looking for a way to get in touch with someone online? Try these pro tips.By Kim Komando
…
continue reading

1
Cyber Espionage Targets Diplomats. Mossad's Illegal Operations.
29:28
29:28
Play later
Play later
Lists
Like
Liked
29:28Send us a text 🔥 Global Intelligence Weekly Wrap-Up | April 25, 2025 Mossad vs. Netanyahu 🇮🇱 | ISIS in Australia 🇦🇺 | Parcel Bomb in the UK 🇬🇧 | Kashmir Attack 🇮🇳 | Cyber Espionage 🔐 | Signal Leak in U.S. 🇺🇸 | Canada Election Interference 🇨🇦 In this week’s Global Intelligence Weekly Wrap-Up, Neil Bisson—Director of the Global Intelligence Knowledge…
…
continue reading

1
Government censorship comes to Bluesky, but not its third-party apps … yet
5:50
5:50
Play later
Play later
Lists
Like
Liked
5:50Government censorship has found its way to Bluesky, but there’s currently a loophole thanks to how the social network is structured. Earlier this month, Bluesky restricted access to 72 accounts in Turkey at the request of Turkish governmental authorities, according to a recent report by the Freedom of Expression Association. Learn more about your a…
…
continue reading

1
Lazarus Strikes Again: Inside Operation SyncHole and the 1-Day Exploitation Crisis
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49In this episode, we break down the most urgent cybersecurity developments from late April 2025—including the Lazarus Group’s high-profile “Operation SyncHole” targeting South Korean industries. Discover how attackers are exploiting newly disclosed vulnerabilities faster than ever, with nearly 1 in 3 CVEs weaponized within 24 hours of publication. W…
…
continue reading

1
Thomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security
1:33:42
1:33:42
Play later
Play later
Lists
Like
Liked
1:33:42Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism. We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national s…
…
continue reading

1
What it takes to become a ruthless tyrant
54:08
54:08
Play later
Play later
Lists
Like
Liked
54:08Looking back about 3,000 years, the playbook on authoritarianism remains pretty much the same as it is today. Back in the 5th century BCE, when Herodotus travelled the ancient world gathering stories, he became an expert in would-be tyrants. His groundbreaking tome, simply called The History, shared vivid descriptions of autocratic and tyrannical r…
…
continue reading

1
OAuth Phishing and Microsoft 365: The Hidden Threats SMBs Can't Ignore
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54In this episode, we dissect the real-world challenges of securing Microsoft 365 environments—especially for small and medium-sized businesses—amid rising threats and licensing limitations. From Reddit frustrations to official Microsoft documentation, we explore the harsh truth: many essential security features, like alerting on suspicious logins, r…
…
continue reading

1
Why Outlook Is Eating Your CPU — And What Microsoft Says About It
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17Microsoft has acknowledged a serious issue affecting users of classic Outlook for Windows: CPU usage spikes up to 50% just from typing emails. First appearing in builds released since November 2024, this bug is now hitting users across several update channels—including Current, Monthly Enterprise, and Insider—leading to power drain, sluggish perfor…
…
continue reading
Older Americans lost nearly $5 billion to scams last year. Don’t let it happen to your loved ones.By Kim Komando
…
continue reading

1
Linktree rolls out a suite of monetization features for creators
4:09
4:09
Play later
Play later
Lists
Like
Liked
4:09Linktree is launching a set of new features aimed at helping creators earn more money directly from its platform. The new tools include the ability to sell courses and digital products, earn from brand-sponsored links, and build shoppable storefronts. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading

1
POLAND: Active and Potential Wildfires & more – 24th April 2025
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55Heavy rain and hailstorms, Easter celebrations, a Ukrainian war memorial vandalized, mourning Pope Francis, a one-billion-dollar deal, and much more! Thanks for tuning in! Let us know what you think and what we can improve on by emailing us at [email protected]. You can also contact us on Twitter & Instagram @rorshokpoland Like what you hear? Subscr…
…
continue reading

1
Risky Bulletin: Cybercriminals stole more than $16 billion last year
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21Cybercriminals stole more than $16 billion last year, Iran tries to hack an EU official, the Lazarus Groups pulls off a successful watering hole and zero-day attack, and WhatsApp adds new chat privacy features. Show notes
…
continue reading
Not a fan of the grocery run? Use these quick tech tricks to stay organized, save money, and skip the hassle.By Kim Komando
…
continue reading

1
The U.S. doesn’t refine cobalt. This startup wants to change that.
3:08
3:08
Play later
Play later
Lists
Like
Liked
3:08Xerion says it has a new technique to produce highly refined cobalt in a single step. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
Blue Shield Breach: 4.7 Million Health Records Leaked via Google Analytics
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47Blue Shield of California has confirmed a data breach affecting 4.7 million members—caused not by hackers, but by a misconfigured Google Analytics setup. Sensitive health information was inadvertently exposed to Google’s ad platforms between April 2021 and January 2024. In this episode, we break down what went wrong, what data was leaked, and what …
…
continue reading

1
$16.6 Billion Lost: The True Cost of Cybercrime in America
8:48
8:48
Play later
Play later
Lists
Like
Liked
8:48Cybercrime in the U.S. has reached new, record-breaking heights. In this episode, we dive deep into the FBI's 2024 Internet Crime Complaint Center (IC3) report — a comprehensive look at the economic and human toll of cybercrime in America. With $16.6 billion in reported losses, a 33% increase year-over-year, and 859,532 complaints filed, the data p…
…
continue reading
Who will lead the Catholic Church next? ChatGPT, Gemini, and Grok all have guesses — but they can’t seem to agree.By Kim Komando
…
continue reading

1
Crowdsourced AI benchmarks have serious flaws, some experts say
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29AI labs are increasingly relying on crowdsourced benchmarking platforms such as Chatbot Arena to probe the strengths and weaknesses of their latest models. But some experts say that there are serious problems with this approach from an ethical and academic perspective. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading
Tom Uren and Adam Boileau talk about how scam compound criminal syndicates are responding to strong government action by moving operations overseas. It’s good they are being affected, but they are shifting into new countries that don’t have the ability to counter industrial-scale transnational organised crime. They also discuss CISA’s Secure by Des…
…
continue reading
A Michigan mom thought she found the perfect home to rent on Facebook. Instead, she walked into a scam that cost her $2,500.By Kim Komando
…
continue reading

1
Tariff turmoil may have killed the tech M&A market’s comeback
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41The tech market doesn’t need to be soaring up and to the right to foster healthy M&A activity. Deals can get done even in down markets. But can M&A thrive in an uncertain market? That’s a harder question. The venture market soured in 2022 as fundraising and exits largely dried up Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading
Always feel like you're being watched or listened to? You are. But here's the part no one wants to admit…By Kim Komando
…
continue reading

1
Florida draft law mandating encryption backdoors for social media accounts billed ‘dangerous and dumb’
3:34
3:34
Play later
Play later
Lists
Like
Liked
3:34A digital rights group blasted the Florida bill, but lawmakers voted to advanced the draft law. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
SN 1022: The Windows Sandbox - Short-life Certs, Ransomware Payout Stats
3:01:51
3:01:51
Play later
Play later
Lists
Like
Liked
3:01:51Enabling Firefox's Tab Grouping. Recalled Recall Re-Rolls out. The crucial CVE program nearly died. It's been given new life. China confesses to hacking the US (blames our stance on Taiwan). CISA says what Oracle still refuses to. Brute force attacks on the (rapid) rise. An AI/ML Python package rates a 9.8 (again!) The CA/Browser forum passed short…
…
continue reading