Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Android Devices Podcasts

show episodes
 
Artwork

1
Android Faithful

Subrilliant LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Android Faithful is your weekly source for Android news, hardware, apps and more. Join Huyen Tue Dao and Ron Richards, along with a host of Android friends and experts as they keep you up to date every week on everything important to the world of Android From phones and foldables, to tablets and TVs and more. We are the Android Faithful. We want to hear from you! Respond to our listener survey: http://bit.ly/androidfaithful-survey Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

51
Space Game Junkie Podcast

Brian Rubin and Jim Hunt

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Space Game Junkie Podcast is a show focused on classic and current space gaming topics, from interviews with developers to shows covering classic games, our podcast is part of the overall love letter to space gaming that is Space Game Junkie. :) You can subscribe via iTunes, Android, Stitcher, Amazon or RSS, and we record every Wednesday at 11 AM Pacific (or 6:00 AM if our guest is overseas) live on YouTube and Twitch unless otherwise noted on our calendar! Thanks for tuning in!
  continue reading
 
Android isn’t just phones. It's a complex ecosystem. It’s feature-filled. It’s customizable. Each week, Jason Howell will take a closer look at the Android operating system as well as the unique devices running it worldwide. From feature spotlights, to tips and tricks, and even reviews of apps that make Android so much fun, Hands-On Android will change how you use your smartphone for the better. Screen reader support enabled. Although the show is no longer in production, you can enjoy episod ...
  continue reading
 
Artwork

1
Anthony Desnos

Anthony Desnos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
I’m Anthony Desnos, a security engineer specializing in Android apps and malware analysis. Date of birth: 18/02/1985 Web: https://anthonydesnos.com/ Address: 4117 David Dr, CA California, US Gmail: [email protected] Social: https://gravatar.com/anthonydesnos522 https://www.facebook.com/anthonydesnos/ https://www.instagram.com/anthonydesnos552/ https://x.com/AnthonyDes19261 https://www.reddit.com/user/Crazy-Mousse-4053/ https://www.scoop.it/u/anthonydesnos522-gmail-com https://www.pi ...
  continue reading
 
Android isn’t just phones. It's a complex ecosystem. It’s feature-filled. It’s customizable. Each week, Jason Howell will take a closer look at the Android operating system as well as the unique devices running it worldwide. From feature spotlights, to tips and tricks, and even reviews of apps that make Android so much fun, Hands-On Android will change how you use your smartphone for the better. Screen reader support enabled. Although the show is no longer in production, you can enjoy episod ...
  continue reading
 
Artwork

1
Fragmented - Android Developer Podcast

Donn Felker, Kaushik Gopal

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Fragmented Podcast is the leading Android developer podcast started by Kaushik Gopal & Donn Felker. Our goal is to help you become a better Android Developer through conversation & to capture the zeitgeist of Android development. We chat about topics such as Testing, Dependency Injection, Patterns and Practices, useful libraries, and much more. We will also be interviewing some of the top developers out there. Subscribe now and join us on the journey of becoming a better Android Developer.
  continue reading
 
Artwork

1
The Stack Overflow Podcast

The Stack Overflow Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
  continue reading
 
Technology can be a powerful ally in our lives, and having access to the right resources and understanding can make all the difference.jMac Fixes Everything was created to provide an easy way for Apple users to learn more about their devices & better connect with the world around them in this new age of technology.Jamie ‘jMac’ Pollock & Royalwise employee #1, Audrey Isbell, teamed up to start jMac Fixes Everything in 2022 with the aim of helping people new to the world of Apple overcome the ...
  continue reading
 
***UPDATE*** This platform is now moving to Anchor.fm/KevinWebbMedia Talking all things Stadia; News, features, and general Stadia game talk. Hosted by Kevin - @KevinWebbMedia (Twitter, Instagram, Facebook, YouTube, Twitch and TikTok). Stadia Username - iKJW#3269.
  continue reading
 
Loading …
show series
 
European airports restoring services after system breach CISA deals with GeoServer exploit App for outing Charlie Kirk’s critics leaks personal data Huge thanks to our sponsor, Conveyor Have you been personally victimized by a questionnaire this week? The queue never ends. But Conveyor can change that story. With AI that answers questionnaires of a…
  continue reading
 
Huyen Tue Dao and Jason Howell decide that two is the right number for episode 115. Plenty of talk about where Gemini is headed (turns out, everywhere at this point), Jason has a brief review of the TCL Nxtpaper 60 Ultra, and Huyen details the walkie talkie feature of Nothing's new earbuds. Note: Time codes subject to change depending on dynamic ad…
  continue reading
 
What happens when a trusted gaming platform becomes a weapon for cybercriminals? That’s exactly what unfolded with BlockBlasters, a free-to-play platformer on Steam that turned from harmless fun into a malicious cryptocurrency-draining scheme. For nearly two months, BlockBlasters appeared safe, even earning “Very Positive” reviews. But in late Augu…
  continue reading
 
Phishing is no longer just an email problem. A new wave of non-email phishing attacks is targeting employees through social media, instant messaging apps, SMS, malicious search engine ads, and even collaboration tools like Slack and Teams. These campaigns are designed to bypass traditional defenses—leaving organizations exposed while attackers expl…
  continue reading
 
Automotive giant Stellantis, the world’s fifth-largest automaker, has confirmed a data breach affecting its North American customers after attackers compromised a third-party service provider’s platform. While no financial data was exposed, the company acknowledged that customer contact details were stolen, prompting advisories to remain vigilant a…
  continue reading
 
Cybersecurity firm HoundBytes has officially launched WorkHorse, an automated security analyst designed to solve one of the biggest pain points in modern Security Operations Centers (SOCs): the Tier 1 bottleneck. Overwhelmed by a constant flood of raw alerts, Tier 1 analysts often suffer from burnout and slow triage times, putting organizations at …
  continue reading
 
Toronto-based cybersecurity startup Mycroft has stepped out of stealth with a bold promise: to give startups and small-to-midsize businesses (SMBs) the kind of enterprise-grade security typically reserved for Fortune 500 companies. Acting as an AI-powered “Security and Compliance Officer,” Mycroft deploys autonomous AI agents that manage an organiz…
  continue reading
 
EDR-Freeze tool suspends security software DeepMind updates Frontier Safety Framework Major vendors withdraw from MITRE EDR Evaluations Huge thanks to our sponsor, Conveyor Security reviews don’t have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Conveyo…
  continue reading
 
Jeff Hollan, director of product at Snowflake, joins Ryan to discuss the role that data plays in making AI and AI agents better. Along the way, they discuss how a database leads to an AI platform, Snowflake’s new data marketplace, and the role data will play in AI agents. Episode notes: Snowflake provides a fully-managed data platform that develope…
  continue reading
 
The FBI has issued a warning to the public about a cyber campaign impersonating the Internet Crime Complaint Center (IC3), using spoofed websites to trick victims into handing over sensitive information and money. Between December 2023 and February 2025, the agency received more than 100 reports of malicious activity tied to fake IC3 domains. Threa…
  continue reading
 
A new cyber campaign is actively targeting macOS users with the Atomic Stealer (AMOS) malware, leveraging fake GitHub repositories disguised as legitimate software downloads. Security researchers tracking the campaign report that the operators are impersonating trusted brands such as LastPass, 1Password, Dropbox, Notion, and Shopify to lure unsuspe…
  continue reading
 
Netskope, a California-based cybersecurity firm specializing in secure access service edge (SASE) solutions, has officially gone public in one of the largest cybersecurity IPOs of 2025. Trading on the Nasdaq under the ticker symbol NTSK, the company raised more than $908 million by selling shares at $19 each. Investor enthusiasm was evident as the …
  continue reading
 
A startling new report from AI security platform SPLX reveals how attackers can bypass the built-in guardrails of AI agents like ChatGPT through a sophisticated exploit involving prompt injection and context poisoning. Traditionally, AI models are programmed to refuse solving CAPTCHAs, one of the most widely deployed tools for distinguishing humans…
  continue reading
 
A cyberattack on Collins Aerospace, a U.S.-based provider of passenger check-in and baggage handling software, plunged major European airports into chaos over the weekend. Beginning late Friday, the disruption rippled across hubs in Brussels, Berlin, and London, crippling critical check-in systems and forcing a reversion to manual operations. Bruss…
  continue reading
 
European airport disruption due to cyberattack check-in and baggage software SMS scammers now using mobile fake cell towers GPT-4-powered MalTerminal malware creates ransomware and Reverse Shell Huge thanks to our sponsor, Conveyor If security questionnaires make you feel like you’re drowning in chaos, you’re not alone. Endless spreadsheets, portal…
  continue reading
 
Rich shared his review of the new iPhone 17 models and talked about notable new features in iOS 26. Dave in Long Beach wants to rip music from his CD’s and listen to them via a flash drive in his car. Rich recommended Exact Audio Copy and YouTube Music. Victoria Song, senior reviewer for The Verge and author of the Optimizer newsletter, will talk a…
  continue reading
 
A new security report has revealed serious, unpatched vulnerabilities in industrial control system (ICS) products manufactured by Novakon, a Taiwan-based subsidiary of iBASE Technology. Security researchers at CyberDanube identified five categories of flaws affecting Novakon’s Human-Machine Interfaces (HMIs), including an unauthenticated buffer ove…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests Jack Kufahl, CISO, Michigan Medicine, and Nick Espinosa, host, The Deep Dive Radio Show Thanks to our show sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust C…
  continue reading
 
The cybercrime group known as RevengeHotels, also tracked as TA558, has launched a new wave of attacks against the hospitality sector, evolving its tactics with the help of Artificial Intelligence (AI) and a powerful new malware strain, VenomRAT. Active since 2015, RevengeHotels has long targeted hotels, travel agencies, and tourism businesses to s…
  continue reading
 
A groundbreaking new cyberattack dubbed ShadowLeak has been uncovered targeting ChatGPT’s Deep Research capability, marking a dangerous escalation in AI-related threats. Unlike prior exploits such as AgentFlayer and EchoLeak, which operated on the client side, ShadowLeak weaponized OpenAI’s own cloud infrastructure to silently exfiltrate sensitive …
  continue reading
 
A new critical vulnerability, CVE-2025-9242, has been discovered in WatchGuard Firebox firewalls, putting thousands of networks worldwide at risk. The flaw stems from an out-of-bounds write bug in the Fireware OS’s iked process, which could allow a remote, unauthenticated attacker to execute arbitrary code. If exploited, this would grant full contr…
  continue reading
 
The SystemBC proxy botnet has quietly become one of the most persistent pillars of the cybercrime ecosystem. First detected in 2019, SystemBC is less about stealth and more about scale. It maintains an average of 1,500 compromised commercial virtual private servers (VPS) around the world, providing a powerful, high-bandwidth proxy network for cyber…
  continue reading
 
Google patches sixth Chrome zero-day exploited in attacks this year Microsoft to force install the Microsoft 365 Copilot app in October Two more Scattered Spider teen suspects arrested Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your secu…
  continue reading
 
Ryan welcomes Sebastian Gierlinger, VP of Engineering at Storyblok, to talk about how headless content management systems (CMS) fit into an increasingly componentized software landscape. They run through the differences between headless and traditional CMS systems (and databases), prototyping and security concerns, and how a team building distribut…
  continue reading
 
Tiffany and Company, the iconic luxury jeweler under the LVMH umbrella, has confirmed a serious data breach impacting over 2,500 customers across the United States and Canada. On or around May 12, 2025, hackers infiltrated Tiffany’s internal systems, compromising sensitive customer data tied to gift cards. Exposed information includes names, email …
  continue reading
 
Insight Partners warns thousands after ransomware breach Scattered Spider gang feigns retirement, breaks into bank instead Consumer Reports calls Microsoft 'hypocritical' Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture i…
  continue reading
 
In a major strategic move, Check Point Software Technologies has announced the acquisition of Lakera, a Zurich and San Francisco–based AI security firm founded by former Google and Meta AI researchers. Valued at around $300 million, the acquisition will close in late 2025 and serve as the foundation for Check Point’s new Global Center of Excellence…
  continue reading
 
A major supply chain attack is underway in the npm ecosystem. Dubbed Shai-Hulud, this worm-style campaign began with the compromise of the popular @ctrl/tinycolor package and has since infected at least 187 npm packages, including some published under CrowdStrike’s official account. The malware, designed to spread automatically, abuses the legitima…
  continue reading
 
A critical vulnerability has been uncovered in ChatGPT’s new calendar integration, exposing how attackers could exfiltrate sensitive user data—particularly emails—through a deceptively simple exploit. Security researchers at EdisonWatch, led by Eito Miyamura, demonstrated how a malicious calendar invitation could contain hidden instructions that Ch…
  continue reading
 
At Fal.Con 2025, CrowdStrike announced one of its boldest moves yet: the acquisition of AI security startup Pangea. The deal signals CrowdStrike’s intent to redefine the future of cybersecurity by protecting not just endpoints and networks, but the entire AI lifecycle. Pangea, founded in 2021, is known for cutting-edge tools like AI Guard, which pr…
  continue reading
 
Microsoft and Cloudflare have successfully dismantled RaccoonO365, a global phishing-as-a-service (PhaaS) operation that had been running for over a year. This criminal platform, marketed on Telegram and used by up to 200 subscribers, enabled attackers to craft realistic Microsoft 365 phishing campaigns, complete with fake login pages, email lures,…
  continue reading
 
House lawmakers move to extend two key cyber programs Apple 0-day likely used in spy attacks affected older devices Reuters crafts phishing scam with AI chatbot help Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture in one…
  continue reading
 
Mishaal, Florence, and Jason finally close the loop on one of the longest running gags from the All About Android days, and it involves fences. Plus, are Android's open roots eroding before out eyes? The Galaxy S26 leaks hard, and Jason unboxes the Infinix GT 30! Note: Time codes subject to change depending on dynamic ad insertion by the distributo…
  continue reading
 
Social engineering has reclaimed center stage as today’s most reliable intrusion vector—and it’s not just email anymore. Recent warnings from law enforcement and national cyber centers underscore how adversaries exploit human psychology to “log in, not hack in,” bypassing hardened perimeters with phishing, vishing (voice phishing) against IT help d…
  continue reading
 
The infamous Rowhammer vulnerability, long thought to be contained by new DRAM protections, has resurfaced with devastating force. Academic researchers, working with Google, have unveiled the Phoenix attack, a breakthrough Rowhammer variant that shatters the defenses of DDR5 memory chips. Despite the industry’s investment in Target Row Refresh (TRR…
  continue reading
 
Cybercriminals aren’t just breaking in—they’re borrowing your brand to do it. This episode dives into the critical intersection of brand protection, threat intelligence, and external attack surface management (EASM) and lays out a practical, intelligence-driven blueprint you can start applying today. We begin with the state of brand abuse: a sharp …
  continue reading
 
California’s Assembly Bill 566 (AB 566) has become one of the most hotly contested pieces of privacy legislation in the country. The bill would require universal “opt-out preference signals” in web browsers and mobile operating systems, allowing consumers to automatically block the sale and sharing of their personal data across the internet. Propon…
  continue reading
 
FinWise Bank is facing a double crisis—one of data security and another of public trust. Nearly 700,000 customers of American First Finance (AFF), a FinWise partner, were impacted by a massive data breach after a former employee improperly accessed sensitive records. The bank has responded with offers of free credit monitoring, but the damage to co…
  continue reading
 
Android moving to “risk-based” security updates CISA accused of Cyber Incentive mismanagement How security practitioners use LLMs Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture in one secure, customer-facing portal, giv…
  continue reading
 
Ryan chats with  Karen Ng, EVP of Product at HubSpot, to chat about Model Context Protocol (MCP) and how they implemented it for their server for their CRM product. They chat the emergence of this as the standard for agentic interactions, the challenges of implementing the server and integrating it with their ecosystem, and how agentic AI has affec…
  continue reading
 
ShinyHunters hits Vietnam National Credit Information Center HybridPetya is a Petya/NotPetya copycat with UEFI Secure Boot bypass CISA seeks control over CVE Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture in one secure,…
  continue reading
 
Rich shares his thoughts on the new iPhone 17 lineup. Caller Carmen in Hollywood can’t save her Google Docs. The issue is likely full storage. Head to one.google.com to check and free up space. Brian Tong, YouTube tech creator, will help break down Apple’s big iPhone 17 announcements. Rich shared an update on his recent accident. Jim in Northern Ar…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests Rob Teel, CTO, Oklahoma Department of Commerce and Howard Holton, CEO, GigaOm Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Like…right now? We know that real-time visibility is critic…
  continue reading
 
On this episode of Android Faithful with Jason Howell and Ron Richards, Beeper’s new CEO Kishan Bagaria shares the app’s evolution, the potential of AI integration, and a shift to on-device privacy. The conversation covers Beeper’s fight against messaging silos, openness versus Apple’s closed ecosystem, and plans to reach 100 million users. Note: T…
  continue reading
 
SonicWall SSL VPN flaws now being actively exploited Acting federal cyber chief outlines his priorities U.S. based investors in spyware firms nearly tripled in 2024 Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it…
  continue reading
 
Ryan welcomes Geraint North, AI and developer platforms fellow at Arm, to dive into the impact of GenAI on chip design, Arm’s approach to designing flexible CPU architectures, and the challenges of optimizing large language models at the chip level for edge devices. Episode notes: Arm is a global compute platform that allows the world’s leading tec…
  continue reading
 
Hey friends, welcome to this episode of the show! First off, an apology. Restream had technical issues yesterday. For some reason only five seconds of our stream went out, and then stopped. Therefore there’s no YouTube copy of this episode, only the MP3. To their credit, Restream fixed the issue relatively quickly, and hopefully this... The post SG…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play