Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Encrypted Podcasts

show episodes
 
Tales of supernatural horror and suspense, old and new, are brought to life in this series of audio narrations enhanced with spinetingling music and sound effects. Featuring stories by acknowledged masters of the genre like M. R. James, E. F. Benson and H. P. Lovecraft, alongside lesser-known authors of the early 20th century waiting to be rediscovered and contemporary talents, The EnCrypted Horror Podcast is your new home for horror, curated, read and produced by Jasper L'Estrange. Subscrib ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

1
Conspiracy Theories

Spotify Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The world’s most controversial events, and the complex beliefs behind them. From Bigfoot sightings to bitcoin takeovers, alien landings to assassinations, who’s shaping the narrative — and why? Conspiracy Theories is a Spotify Podcast. New episodes Wednesdays. Watch episodes and more on YouTube: www.youtube.com/@ConspiracyTheoriesPodcast
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
  continue reading
 
Artwork

1
The Live Drop

Mark Valley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Venture into the elusive world of intelligence collection and espionage to spot, assess and debrief: spies, handlers, catchers, analysts, cut-outs, dangles, diplomats, security experts and the storytellers who bring them all to life. Check your electronics and subscribe, do a thorough surveillance detection route, secure your Live Drop location, and after a mad-minute introduction, listen in on conversations with our fascinating guests who help to illuminate a complex universe. A HUMINT expe ...
  continue reading
 
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
  continue reading
 
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
  continue reading
 
Artwork

301
The Encrypted Economy

Eric Hess

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
  continue reading
 
Artwork

1
TechSNAP in HD

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP OGG

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP Large Video

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
Self-Hosted

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
  continue reading
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
  continue reading
 
Artwork

1
TechSNAP Mobile Video

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
  continue reading
 
Artwork

501
Solarpunk Manifesto

Maxim Velli, Lola Kengen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In a world where pessimism prevails, being hopeful is punk. Solarpunk Manifesto is a podcast dedicated to radical hope and imagination, inviting leading thinkers, artists, and activists to collectively explore alternative futures. Solarpunk is the counter-cultural movement our generation craves. Instagram: @solarpunk.manifesto
  continue reading
 
Artwork

1
Law Report

ABC listen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
From courtroom dramas to miscarriages of justice, to how the law affects you — and so much more. The Law Report is your accessible guide to the big legal stories unfolding in Australia and across the world.
  continue reading
 
Artwork

1
In Conversation With

Internet Watch Foundation (IWF)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A series of shortcasts from the Internet Watch Foundation (IWF) about their leading non-profit work tackling online child sexual abuse. Our series of short podcasts feature discussions with leading experts and academics covering a wide variety of topics including tech, encryption, policy and how these impact the criminal circulation of child sexual imagery online. Find out more at iwf.org.uk
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Artwork

1
Unspun

Amanda Sturgill

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Unspun is critical thinking about the news. Hear real examples, past and present, of newsmakers attempting to mislead you and understand how they manipulate the truth. Learn how to avoid being swayed by fake news and misinformation. Get Unspun, because you deserve the truth.
  continue reading
 
Artwork
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Welcome to the Clear Crypto Podcast, straight talk on what crypto and blockchain do today, and what they're going to do tomorrow with Nathan Jeffay, Head of Media at StarkWare and Gareth Jenkinson, Head of Multimedia at Cointelegraph.
  continue reading
 
Artwork

1
Trail of Bits

Trail of Bits

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
  continue reading
 
Artwork

1
Best Of Reddit Stories 2025 Cheating, True Crime, AITA and NSFW Stories

Best Of Reddit Stories 2025 Cheating, True Crime, AITA and NSFW Stories

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Best Of Reddit Stories 2025 Dive into the latest and greatest Reddit stories of 2025! From jaw-dropping "Am I the A**hole?" moments to heartwarming tales from r/HumansBeingBros, this collection brings together the most entertaining, shocking, and thought-provoking posts Reddit has to offer. We’re covering everything from dramatic revenge stories and awkward family confessions to inspiring life lessons and hilarious fails. Whether you’re here for the laughs, the drama, or the unexpected twist ...
  continue reading
 
Artwork

1
KBKAST

KBI.Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
  continue reading
 
Artwork

1
The Amish Inquisition Podcast

The Amish Inquisition

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Today's Weather: Brighter in the North, like the people. Unrehearsed nonsense, de-rigeur fake news & plagiarised jokes. Bipedal humanoids, present your dilated aural canals to the assault that is: The Amish Inquisition...
  continue reading
 
Loading …
show series
 
Oregon-based Jewett-Cameron Company, a manufacturer of fencing, kennels, and specialty wood products, has confirmed that it was the victim of a double-extortion ransomware attack on October 15, 2025, in an incident that disrupted operations and exposed sensitive corporate data. The attackers infiltrated the company’s IT network, deploying encryptio…
  continue reading
 
In this episode of UnSpun, we trace the invisible architecture that keeps truth alive when communication is forbidden. From Phyllis Latour Doyle’s coded knitting in Nazi-occupied France to encrypted mesh networks during Hong Kong’s pro-democracy protests, “The Geometry of Trust” reveals how humans build secret systems of meaning under surveillance.…
  continue reading
 
A shy novelist accepts an invitation to spend Christmas with another writer in a remote house in Penzance, Cornwall. He quickly regrets his decision… This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “MRS LUNT” by Hugh Walpole, 1926. 💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀 Supporting my work If you like, you candonate in the follo…
  continue reading
 
EASY LISTENING DEP’T.: Protesters showing up to wave Israeli flags outside the building does not mean that the "tension was spilling out of the synagogue." It's like when anti semitic protesters showed up on Broadway outside the fence of Columbia University, and their behavior was incorporated into the brief against the Columbia campus protesters, …
  continue reading
 
What’s the real tension in blockchain, total transparency or total privacy, and how do we unlock both? Hosts Nathan and co-host Gareth dive deep with Yannik Schrade, CEO and co-founder of Arcium, on the privacy revolution: encrypted computing, zero-knowledge proofs, and multi-party magic that lets blockchains handle sensitive data like medical reco…
  continue reading
 
Shakespeare’s First Folio is an incredible historical treasure. It also might be an encrypted treasure map. According to the theories, the First Folio’s secret code reveals the “real” Shakespeare author, a royal cover-up, a Freemason conspiracy, and of course, a map to priceless buried treasure. Treasure that may still be out there. Keep up with Co…
  continue reading
 
This episode is a deep dive into the mathematics, implementation, and vulnerabilities of modern digital security, focusing on the powerful role of Elliptic Curve Cryptography (ECC). ECC has largely superseded older algorithms like RSA because of its superior efficiency, providing equivalent security strength with significantly shorter keys, a cruci…
  continue reading
 
The High Court has unanimously upheld the use of police evidence obtained by monitoring an encrypted messaging app used by organised criminals. The decision is a huge victory for policing, but does it raise questions about the breadth of Australia's surveillance laws?By Australian Broadcasting Corporation
  continue reading
 
The Pwn2Own Ireland 2025 hacking competition was set to feature one of its most anticipated moments — a $1 million zero-click remote code execution exploit against WhatsApp — but the demonstration never happened. Scheduled to be showcased by researcher Eugene of Team Z3, the exploit’s abrupt withdrawal stunned attendees and quickly became the most …
  continue reading
 
A serious vulnerability has been discovered in the OpenAI Atlas omnibox, a hybrid interface designed to handle both URLs and user prompts. Researchers at NeuralTrust revealed that attackers can disguise malicious instructions as URLs to jailbreak the omnibox, taking advantage of how Atlas interprets malformed input. Unlike traditional browsers, Atl…
  continue reading
 
A critical remote code execution (RCE) flaw, tracked as CVE-2025-59287, has put thousands of enterprise networks at risk by exposing the Windows Server Update Service (WSUS) to active exploitation. The vulnerability, rooted in unsafe object deserialization, allows unauthenticated remote attackers to execute arbitrary code with System-level privileg…
  continue reading
 
The launch of Perplexity’s Comet AI browser — a major step forward in AI-assisted browsing — was almost immediately hijacked by cybercriminals. Within weeks of its July debut, threat intelligence firm BforeAI uncovered a coordinated impersonation campaign designed to exploit public interest in the new product. The campaign involved a web of fraudul…
  continue reading
 
🥼🧪Martyn Dade-Robertson is an architect specializing in design computation and synthetic biology, and Professor of Emerging Technologies at Northumbria University. 🏠Martyn is the co-founder of the Hub for Biotechnology in the Built Environment (HBBE), a pioneering research centre exploring how living systems and biotechnologies can transform the wa…
  continue reading
 
A new wave of cyber-espionage attacks reveals North Korea’s deepening effort to steal critical defense technologies from Europe. In a sophisticated campaign dubbed Operation Dream Job, the Lazarus Group — also known as Diamond Sleet and Hidden Cobra — has launched targeted attacks on European defense contractors and UAV (unmanned aerial vehicle) de…
  continue reading
 
Cops, What s the Creepiest Thing You've Found During a House Search | Police Paranormal Stories Police officers see the darkest corners of humanity — but sometimes, what they find can’t be explained by logic. In this chilling episode, real cops share their most **terrifying paranormal encounters** during house searches and investigations. From ghos…
  continue reading
 
SCARY Videos That'll Creep You Out #ScaryGhost #HauntedHouse #GhostSighting #RealGhostCaughtOnCamera YOUTUBE VIDEO ⁠⁠https://youtu.be/6oIH2Ykh5ok⁠ ⁠⁠⁠A family believes their house is **haunted** due to some **strange things** happening. The creepiest part is when their son says he saw a man in the window, which was **caught on camera**! Is this **m…
  continue reading
 
https://youtu.be/IOa9tjoxsQ8 https://odysee.com/@NaomiBrockwell:4/Flock:3 They’re on street corners, utility poles, even garbage trucks... and they’re tracking everywhere you go. Welcome to the world of Automatic license plate readers. These aren't just cameras. They're part of a cloud-based surveillance network logging your movements in real time,…
  continue reading
 
Toys “R” Us Canada has confirmed a customer data breach after records from its database appeared on the dark web on July 30, 2025, prompting a full-scale cybersecurity investigation and disclosure to privacy regulators. The company’s internal review, conducted in partnership with third-party experts, verified that an unauthorized party accessed and…
  continue reading
 
A dangerous zero-day vulnerability in Kyocera Communications subsidiary Motex’s Lanscope Endpoint Manager has triggered a global cybersecurity alert after being actively exploited in real-world attacks. Tracked as CVE-2025-61932, this flaw carries a CVSS severity score of 9.8, allowing remote, unauthenticated attackers to execute arbitrary code sim…
  continue reading
 
The Internet Systems Consortium (ISC) has released a series of critical BIND 9 updates to fix multiple high-severity vulnerabilities affecting DNS resolver systems worldwide. The flaws—tracked as CVE-2025-40780, CVE-2025-40778, and CVE-2025-8677—pose serious threats ranging from cache poisoning to denial-of-service (DoS) attacks. These vulnerabilit…
  continue reading
 
EASY LISTENING DEP’T.: On the website, the Times this morning published a piece that really digs into and emphasizes the point that its reporters keep making, down inside the incremental coverage of Donald Trump's ongoing campaign of slaughter at sea. It's a NEWS ANALYSIS piece by Charlie Savage, “The peril of a White House that flaunts its indiffe…
  continue reading
 
A critical new vulnerability is wreaking havoc across the global e-commerce ecosystem. Tracked as CVE-2025-54236 and dubbed SessionReaper, this flaw affects Adobe Commerce and Magento Open Source platforms, allowing attackers to bypass security features and seize control of customer accounts through the Commerce REST API. Despite Adobe releasing em…
  continue reading
 
Cybersecurity firm SquareX has unveiled a new and alarming threat to users of AI-enabled browsers — a technique called AI Sidebar Spoofing. This sophisticated attack uses malicious browser extensions to create visually identical replicas of legitimate AI sidebars, tricking users into believing they are interacting with trusted AI assistants like Ch…
  continue reading
 
The Russian state-sponsored hacking group Star Blizzard — also tracked as ColdRiver, Seaborgium, and UNC4057 — has undergone a major transformation in its operations following public exposure earlier this year. After researchers at Google detailed its LostKeys malware and PowerShell-based infection chain in June 2025, the group swiftly abandoned th…
  continue reading
 
EASY LISTENING DEP’T.: The process of tearing down the East Wing,” the story continues, “was expected to be completed as soon as this weekend, two senior administration officials said, as Mr. Trump moved rapidly to carry out a passion project that he said was necessary to host state dinners and other events. But,” the story then says, “the previous…
  continue reading
 
San Francisco-based Keycard has officially emerged from stealth mode, announcing $38 million in funding across seed and Series A rounds to build what may become one of the most critical infrastructure layers of the AI era — identity and access management (IAM) for AI agents. Founded in 2025 by former senior executives from Snyk and Okta, Keycard is…
  continue reading
 
Security researchers are urging immediate action after TP-Link disclosed multiple critical vulnerabilities in its Omada gateway line, affecting a wide range of ER, G, and FR series devices. The flaws—now patched by TP-Link—expose organizations to remote code execution, privilege escalation, and full network compromise, making them among the most se…
  continue reading
 
A critical new vulnerability known as TARmageddon (CVE-2025-62518) has sent shockwaves through the Rust developer community and the broader cybersecurity world. This high-severity desynchronization flaw, discovered in the Async-tar and Tokio-tar libraries, exposes millions of downstream applications to the risk of remote code execution and supply c…
  continue reading
 
A new evolution in information-stealing malware has arrived — and it’s already drawing serious attention from researchers and defenders alike. The release of Vidar 2.0 represents a complete transformation of the long-running Vidar infostealer, which has been rewritten entirely in C and equipped with multi-threading and advanced anti-analysis mechan…
  continue reading
 
Dataminr, the AI powerhouse known for its real-time risk and event detection platform, has announced plans to acquire ThreatConnect, a cybersecurity firm specializing in threat intelligence aggregation and response, for $290 million in cash and equity. This strategic move marks a major milestone in the ongoing consolidation of the threat intelligen…
  continue reading
 
In one of the largest cybersecurity acquisitions of 2025, Veeam Software has announced plans to acquire Securiti AI for $1.725 billion in cash and stock, signaling a fundamental shift in how enterprises will secure, manage, and govern their data in the age of artificial intelligence. The deal, expected to close in the fourth quarter, will bring tog…
  continue reading
 
EASY LISTENING DEP’T.: Donald Trump's demolition of the East Wing of the White House continued yesterday, advancing well past the facade to smash the main structure. The New York Times belatedly realized that this was, in fact, front page news, and put the picture on the front page at the top, four columns wide. But, being the Times, decided that t…
  continue reading
 
California-based cybersecurity firm Defakto has raised $30.75 million in Series B funding, led by XYZ Venture Capital, bringing its total investment to roughly $50 million. The new capital will power the company’s rapid expansion in product development and global market reach for its identity and access management (IAM) platform—one specifically de…
  continue reading
 
In a landmark move for the cybersecurity industry, Dr. Allan Friedman — often called the Father of SBOMs — has joined supply chain security firm NetRise as a strategic advisor. Friedman’s transition from his influential role at CISA marks a pivotal moment where public policy meets private innovation. His mission: to push the Software Bill of Materi…
  continue reading
 
Mattie Colquhoun (pronounced kuh-hoon), known online as Xenogothic, is a writer and photographer from Hull, UK. They are best known for continuing the intellectual and cultural legacy of the late Mark Fisher, one of the most influential contemporary cultural theorists and political philosophers, and Mattie’s former teacher at Goldsmiths London in 2…
  continue reading
 
In July 2025, researchers discovered an interstellar object entering our solar system. It’s only the third we’ve detected – ever – and it’s been dubbed Comet 3I/ATLAS. NASA says it does not pose a threat to us. But one Harvard scientist suggests 3I/ATLAS isn’t necessarily a comet – there are too many anomalies. He says, this object may not be natur…
  continue reading
 
In this episode, we sit down with M.K. Palmore, Chief Executive Officer at Apogee Global RMS, as he explores strategies for leading through uncertainty with a focus on security, safety, and cyber awareness in times of crisis. M.K. emphasises the critical importance of practicing security response scenarios, noting that organisations truly respond b…
  continue reading
 
Think your mouse is harmless? Steve and Leo uncover how modern optical mice might be secretly "listening" in, and reveal why satellite data pouring down on us is almost entirely unsecured. The long awaited lawsuit to block Texas SB2420. Embattled Texas SB2420 also impacts Google Play. At long last, NIST modernizes their password policy. Scattered L…
  continue reading
 
Think your mouse is harmless? Steve and Leo uncover how modern optical mice might be secretly "listening" in, and reveal why satellite data pouring down on us is almost entirely unsecured. The long awaited lawsuit to block Texas SB2420. Embattled Texas SB2420 also impacts Google Play. At long last, NIST modernizes their password policy. Scattered L…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play