Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Tales of supernatural horror and suspense, old and new, are brought to life in this series of audio narrations enhanced with spinetingling music and sound effects. Featuring stories by acknowledged masters of the genre like M. R. James, E. F. Benson and H. P. Lovecraft, alongside lesser-known authors of the early 20th century waiting to be rediscovered and contemporary talents, The EnCrypted Horror Podcast is your new home for horror, curated, read and produced by Jasper L'Estrange. Subscrib ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Self-Hosted

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
  continue reading
 
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
  continue reading
 
Welcome to Uncanny Valley—an insider look at the people, power, and influence of Silicon Valley– where each week, WIRED’s writers and editors bring you original reporting and analysis about some of the biggest stories in tech. On Tuesdays, WIRED’s Zoë Schiffer has an urgent conversation about this week in the news. And on Thursdays, WIRED’s Global Editorial Director Katie Drummond is joined by Lauren Goode, Michael Calore, to break down a recent story or phenomena bubbling up in Silicon Vall ...
  continue reading
 
The Vanished is a true crime podcast that explores the stories of those who have gone missing. The Vanished goes beyond conventional news reports to take a deep dive into the story of a different missing person each week. Host Marissa Jones brings you exclusive interviews with family members, friends, law enforcement and experts. What will The Vanished uncover next? Listen to The Vanished on the Wondery App or wherever you get your podcasts. You can listen to all episodes ad-free on Wondery+ ...
  continue reading
 
Artwork

1
Lock and Code

Malwarebytes

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
  continue reading
 
Tom Merritt and the team help you stay up to date with an independent, authoritative and trustworthy tech news briefing. Become a member at https://plus.acast.com/s/dtns. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
TechSNAP in HD

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP OGG

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP Large Video

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
  continue reading
 
Artwork

1
TechSNAP Mobile Video

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork
 
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork
 
Tech policy is at the center of the hottest debates in American law and politics. On the Tech Policy Podcast, host Corbin Barthold discusses the latest developments with some of the tech world's best journalists, lawyers, academics, and more.
  continue reading
 
HawkShield is a Singapore-based, data and network security provider. We offer AI-powered data security and privacy services to companies of different sizes and industries. Contact us today. https://www.hawkshield.ai/
  continue reading
 
Artwork

1
Crucial Tech

Lou Covey

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Unraveling the technology that affects us all but that few of us understand, in a format to give you a basic understanding in the time it takes to drive to and from the grocery store.
  continue reading
 
Artwork

601
Tech Gumbo

Haggai Davis

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
We started Tech Gumbo in Nov 2014 as a conversational show of news, information & updates about the past, present & future of all things technology in a topical, interesting and digestible way.
  continue reading
 
Artwork
 
The Fren Zone brings you the brightest technical minds in crypto and web3. Join our host Mason as he goes on a technical deep dive with cutting-edge projects building new and novel technology. Twitter: @tokensoftinc
  continue reading
 
Loading …
show series
 
What is the secret of the curiously empty seat on the Embankment between the Avenue and Westminster Bridge?This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “ON THE EMBANKMENT” by Hugh E. Wright (1919).CREATOR’S NOTE: Due to some copyright confusion, Spotify have alerted me to the fact that 61 episodes of t…
  continue reading
 
Corbin Barthold (TechFreedom) discusses the recent spate of attacks on end-to-end encryption—and free speech more broadly—in the United Kingdom and United States. Links: U.K. Orders Apple to Let It Spy on Users’ Encrypted Accounts Tech Policy Podcast 356: The UK Targets End-to-End Encryption The UK’s state-funded anti-encryption propaganda The UK H…
  continue reading
 
When it comes to polite discussion, there are two things you should never discuss: Politics and Religion. At the same time, most people would also rather not talk about insurance or data encryption. Well, I can’t say I’m all that polite, because that is exactly what this episode is about. The need for encryption on or data has never been more impor…
  continue reading
 
Surge in Scans for Juniper t128 Default User Lasst week, we dedtect a significant surge in ssh scans for the username t128 . This user is used by Juniper s Session Smart Routing, a product they acquired from 128 Technologies which is the reason for the somewhat unusual username. https://isc.sans.edu/diary/Surge%20in%20Scans%20for%20Juniper%20%22t12…
  continue reading
 
What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in the cybersecurity industry, and the recent launch of the CVE Foundation. We also discuss the Trump Administration’s executive order that revoked the security clearan…
  continue reading
 
Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
  continue reading
 
Government censorship has found its way to Bluesky, but there’s currently a loophole thanks to how the social network is structured. Earlier this month, Bluesky restricted access to 72 accounts in Turkey at the request of Turkish governmental authorities, according to a recent report by the Freedom of Expression Association. Learn more about your a…
  continue reading
 
The panel of Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Marty Jencius, and Eric Bolden discuss Tim Cook’s strategic influence in securing tariff exemptions, highlighting his low-key leadership style focused on Apple’s interests. They explore updates to Apple’s Sports app, praising its clean interface and new sharing features. The convers…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityJohn Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security progra…
  continue reading
 
Linktree is launching a set of new features aimed at helping creators earn more money directly from its platform. The new tools include the ability to sell courses and digital products, earn from brand-sponsored links, and build shoppable storefronts. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
  continue reading
 
At NAB Show 2025, Donovan Davis, Product Specialist for Osmo for DJI showcases the Osmo Mobile 7 gamble with a new tracking module that works with any app, built-in tripod, lighting controls, and 10-hour battery life. The DJI Mic Mini offers compact wireless audio with Bluetooth and receiver options. The RS-4 Mini gimbal supports both smartphones a…
  continue reading
 
Adobe updates its Firefly generative model with vector image support, and Tom talks with Sean Hollister about toilet tech in Japan. Starring Jason Howell, and Huyen Tue Dao, and Sean Hollister. Show notes can be found here. Become a member at https://plus.acast.com/s/dtns. Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
AI labs are increasingly relying on crowdsourced benchmarking platforms such as Chatbot Arena to probe the strengths and weaknesses of their latest models. But some experts say that there are serious problems with this approach from an ethical and academic perspective. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Under the new Trump administration, more and more visa holders and foreign visitors are being detained or denied entry at the border. It’s also becoming more common for people to be questioned or detained because of content on their phones, laptops and cameras. In today’s episode, we’ll tell you what you need to know about your carrying devices acr…
  continue reading
 
Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
  continue reading
 
John Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security programs across finance, tech, and e-commerce. …
  continue reading
 
The tech market doesn’t need to be soaring up and to the right to foster healthy M&A activity. Deals can get done even in down markets. But can M&A thrive in an uncertain market? That’s a harder question. The venture market soured in 2022 as fundraising and exits largely dried up Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Apple TV+ earns two Peabody nominations for powerful documentaries “Bread and Roses” and “The Last of the Sea Women,” but hosts Chuck Joiner and Charlotte Henry express frustration over Apple’s poor promotion of its content. They praise Apple’s overall documentary quality yet note how many shows go under the radar. The conversation also covers the …
  continue reading
 
Enabling Firefox's Tab Grouping. Recalled Recall Re-Rolls out. The crucial CVE program nearly died. It's been given new life. China confesses to hacking the US (blames our stance on Taiwan). CISA says what Oracle still refuses to. Brute force attacks on the (rapid) rise. An AI/ML Python package rates a 9.8 (again!) The CA/Browser forum passed short…
  continue reading
 
Loading …
Listen to this show while you explore
Play