Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Encrypted Podcasts

show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
  continue reading
 
Artwork

1
Self-Hosted

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
  continue reading
 
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
  continue reading
 
Tales of supernatural horror and suspense, old and new, are brought to life in this series of audio narrations enhanced with spinetingling music and sound effects. Featuring stories by acknowledged masters of the genre like M. R. James, E. F. Benson and H. P. Lovecraft, alongside lesser-known authors of the early 20th century waiting to be rediscovered and contemporary talents, The EnCrypted Horror Podcast is your new home for horror, curated, read and produced by Jasper L'Estrange. Subscrib ...
  continue reading
 
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
TechSNAP in HD

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP OGG

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork

1
TechSNAP Large Video

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
  continue reading
 
Artwork

1
TechSNAP Mobile Video

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
  continue reading
 
Artwork
 
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
  continue reading
 
Artwork

1
In Conversation With

Internet Watch Foundation (IWF)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A series of shortcasts from the Internet Watch Foundation (IWF) about their leading non-profit work tackling online child sexual abuse. Our series of short podcasts feature discussions with leading experts and academics covering a wide variety of topics including tech, encryption, policy and how these impact the criminal circulation of child sexual imagery online. Find out more at iwf.org.uk
  continue reading
 
Artwork

1
The Live Drop

Mark Valley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Venture into the elusive world of intelligence collection and espionage to spot, assess and debrief: spies, handlers, catchers, analysts, cut-outs, dangles, diplomats, security experts and the storytellers who bring them all to life. Check your electronics and subscribe, do a thorough surveillance detection route, secure your Live Drop location, and after a mad-minute introduction, listen in on conversations with our fascinating guests who help to illuminate a complex universe. A HUMINT expe ...
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork

1
Technology Now

Hewlett Packard Enterprise

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
HPE news. Tech insights. World-class innovations. We take you straight to the source — interviewing tech's foremost thought leaders and change-makers that are propelling businesses and industries forward.
  continue reading
 
Artwork
 
Unraveling the technology that affects us all but that few of us understand, in a format to give you a basic understanding in the time it takes to drive to and from the grocery store.
  continue reading
 
Beyond Downtime: The Verito Advantage is the podcast for tax and accounting professionals who refuse to let IT issues interrupt their business. Hosted by the experts behind Verito.com, each episode explores the real risks behind "good enough" technology and how to build a firm that just works. Securely. Join us as we dive into real-world stories, compliance must-knows (like the FTC Safeguards Rule, IRS Pub 4557, WISP), and emerging tech shaping the future of financial practices. From ransomw ...
  continue reading
 
Artwork
 
Tech policy is at the center of the hottest debates in American law and politics. On the Tech Policy Podcast, host Corbin Barthold discusses the latest developments with some of the tech world's best journalists, lawyers, academics, and more.
  continue reading
 
Artwork
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Artwork
 
The Fren Zone brings you the brightest technical minds in crypto and web3. Join our host Mason as he goes on a technical deep dive with cutting-edge projects building new and novel technology. Twitter: @tokensoftinc
  continue reading
 
The Awareness Angle makes cybersecurity simple. Hosted by Anthony and Luke, we break down security awareness stories, from phishing scams to data breaches, and share practical tips to keep colleagues and employees safe online. We focus on tackling human risk, building a security culture, and making security easy to understand. Whether you’re new to security awareness or want fresh ideas, join us for relatable advice, real-world examples, and strategies to protect your data and stay ahead of ...
  continue reading
 
Hands-On Windows, featuring Paul Thurrott, will help you adapt to the changes made in Windows 11. From visual tweaks to performance boosts Hands-On Windows will show you how to get the most out of your Windows 11 PC. You can join Club TWiT for $10 per month and get ad-free audio and video feeds for all our shows plus everything else the club offers...or get just this podcast ad-free for $5 per month. New episodes every Thursday.
  continue reading
 
Artwork

1
GPS DairyCAST

GPS Dairy Consulting, LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The GPS DairyCAST features the high-value insights of the GPS Dairy Consulting team’s trusted advisors and the owners and managers from the elite dairy farms they serve. These conversations deliver on the GPS Dairy Consulting promise to inspire change and grow leaders. Learn more at GPSdairy.com.
  continue reading
 
Loading …
show series
 
In theory, full disk encryption (FDE) just works. You just have to enable it. But in practice, cops get access to a lot of devices, even when they are encrypted. I want to summarize the current state of full disk encryption. I will explain conceptional weaknesses/attacks, practical physical attacks (videos of live demos) and give recommendations. I…
  continue reading
 
How do we prepare our cybersecurity for a post quantum world? This week, Technology Now explores how security experts are looking to future-proofing their work. We will examine the hurdles to post-quantum security, the underlying ways in which our data is protected, and we will be delving into the underground world of “harvest now, decrypt later”. …
  continue reading
 
FTC commissioners Rebecca Slaughter, Alvaro Bedoya, and Bill Kovacic speak with hosts Bilal Sayyed and Jessica Melugin at the 2025 TechFreedom / CEI Policy Summit: Constitutional Limits of FTC, FCC & DOJ Interference in Media and Speech. Links: Constitutional Limits of FTC, FCC and DOJ | Day 1 Constitutional Limits of FTC, FCC and DOJ | Day 2 SCOTU…
  continue reading
 
This week on The Awareness Angle, Anthony Davis and Luke Pettigrew explore a special episode on what it really takes to build meaningful cybersecurity awareness, as part of preparing for Cybersecurity Awareness Month. 📢 Beyond the Poster Campaign – Open communication channels and positive reinforcement are key to building trust and encouraging peop…
  continue reading
 
A while ago, I found a curious little processor and starting reverse-engineering it. Join me as I retell my journey through the Amlogic Video Decoder, from staring at bits over running hand-written instructions, to my own emulator and architecture manual.Disclaimer: "28-bit" isn't quite correct, but you'll see.Project homepage / Git repo: https://c…
  continue reading
 
So schnell ist es auch wieder vorbei. Hier gibt es ein kleines Rewind mit Daten und Fakten zur diesjährigen GPN.Vielen Dank, dass Du mitgemacht hast!<3Zahlen, Daten, Fakten, Graphen.Aaaaahhhhh. Ooooooohhhhhhh. Uuuuuuuuuuhhhhhhhh.Licensed to the public under https://creativecommons.org/licenses/by/4.0/about this event: https://cfp.gulas.ch/gpn23/tal…
  continue reading
 
The last Tech Addicts Podcast of June and returning in August. This week Samsung Unpacked 2025, Ted'd home Hi-Fi, a casio Watch Ring, a sever data breach, NFC 15 upgrade and much more. With Gareth Myles and Ted Salmon Join us on Mewe RSS Link: https://techaddicts.libsyn.com/rss iTunes | YouTube Music | Stitcher | Tunein | Spotify Amazon | Pocket Ca…
  continue reading
 
Wir wollen in unserem Projekt Menschen mit ALS unterstützen, indem wir Eye-Tracking als Kommunikationshilfe zugänglicher und günstiger machen, und das in gemeinnützig und Open-Source. In unserem Vortrag werden wir unser Projekt, die Erkrankung sowie Eye-Tracking als Technologie vorstellen.ALS und MS sind Krankheiten, die Betroffenen nach und nach d…
  continue reading
 
A short session for even shorter talks.Language: English or German-- english --Wanna say something? The stage is yours. You have 10 minutes to talk about anything. A short talk about the mating behaviour of jellyfish; promoting your new open-source project; a small hack that you found; social commentary ... anything goes.Available infrastructure: A…
  continue reading
 
In diesem Vortrag möchte ich _"Lichtung"_ vorstellen -- eine kleine Server/Client-Anwendung, die einen simplen Micorblogging-Service zur Verfügung stellt und somit eine Lichtung in den dichten Internet-Wald schlägt.Sie ist entworfen, um innerhalb eines IP-Netzwerks einen deterministischen Feed von Beiträgen und verschlüsselte Chatrooms zwischen je …
  continue reading
 
Der Traum der grenzenlosen Eisenbahn in Europa heißt SERA. Durch technische Standards für die Interoperabilität sollen Züge in Zukunft in jedem Land Europas fahren können. Ich versuche zu erklären, wie das klappen soll und warum es dabei auch um Security geht.Auf der GPN21 habe ich über das Problem grenzüberschreitender Zugfahrten berichtet. [1] Di…
  continue reading
 
KISS (Keep it Simple, Stupid!) ist ein Prinzip der Software- und Systemarchitektur, nach welchem Systeme möglichst einfach gehalten werden sollen. In diesem Talk möchte ich an dieses Prinzip erinnern, Positiv- und Negativbeispiele aufzeigen, und ein Plädoyer dafür halten, Systeme so einfach wie möglich zu gestalten.Diese Idee der Einfachheit hat au…
  continue reading
 
Wenn man nur einen Hammer hat, sieht alles aus wie ein Nagel – so fühlt es sich manchmal an, wenn man die Begeisterung rund um „KI“ betrachtet. Gemeint ist dabei fast immer nur der Teilbereich generativer KI, die mit stochastischen Methoden plausible Ergebnisse produzieren soll. Links liegen bleibt dagegen „Good Old-Fashioned AI“, also regel- und l…
  continue reading
 
Der Vortrag zeigt, wie man zur eigenen Marke kommt. Mit etwas IT-Know-How und Grundlagenwissen aus diesem Vortrag steckt ein geneigter Nerd* so manche juristische Dienstleister bei der Recherche in die Tasche und hat anschließend eine Marke.Eine unklare Markenrechtslage ist für Vereine und auch freie Software öfter ein Problem, als man denkt. Der F…
  continue reading
 
Please enjoy this encore of Career Notes. Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. She began college studying computer science and ended with a degree in computer information systems as it had more of the business side. Working in the private sector for companies such as D…
  continue reading
 
In our daily life, we often think of PDF documents as static and immutable. This mental model is wrong.In this presentation, we give a brief overview of PDF (in-)security and describe a novel kind of attack where a malicious PDF document can* change its displayed content with time (while the file stays the same)* display different content to differ…
  continue reading
 
Having looked at multiple implementations of DRAM initialization code for different platforms, both in binary and source form, I have started to see certain patterns occur. In this talk, we will focus on the binary form, since it is how that code is often distributed these days, and thus useful to gain an understanding of how modern DRAM controller…
  continue reading
 
Früher wurde Strom vor allem aus Kohle-, Gas- und Kern-kraftwerken erzeugt. Da das aber extrem schädlich für Umwelt und Klima ist, setzen wir inzwischen deutlich mehr auf nachhaltig erzeugten Strom, wie Wind- und Sonnenenergie. Diese stehen jedoch leider nicht immer zur Verfügung. Bisher ist gerade mal die Hälfte der Stromerzeugung in Deutschland e…
  continue reading
 
A short session for even shorter talks.Language: English or German-- english --Wanna say something? The stage is yours. You have 10 minutes to talk about anything. A short talk about the ultimate Tschunk recipe; promoting your new open-source project; a small hack that you found; social commentary ... anything goes.Available infrastructure: A micro…
  continue reading
 
Ever wondered how PC demos are made? What technologies are used and how people are working together in such a loose environment? Let's have a look together at how the demo "Grow Beyond", the invitation for Revision 2025 was made.In September 2024 a handful of people came together to create the invitation to the biggest demoscene event of the year. …
  continue reading
 
Ein Spot-Roboterhund von Boston Dynamics ist euch zu teuer oder passt nicht in euren Hackerspace? Probiert es doch mit [dieser handlichen kleinen Roboterkatze](https://github.com/Windfisch/robocat) für unter 50 Euro Materialkosten. Bastel~~spass~~bedarf garantiert! :DIch stelle mein Projekt eines vierbeinigen Roboters vor: Vom mechanischen Entwurf …
  continue reading
 
Augen zu und durch, begleiten Sie mich weiter auf dem Weg zur elektronischen Patientenakte (ePA). Es ist nicht so, dass die Welt auf die ePA gewartet hätte. Auch haben wir keine Notlage, die drastische Maßnahmen erforderte. Aber die EU-Kommission hat die Datenökonomie im Gesundheitsdatenraum (EHDS) nun einmal beschlossen. Die ePA bildet dafür die z…
  continue reading
 
Ich wollte meine Wählscheibentelefone an eine moderne Telefonanlage anschließen und brauchte dazu einen Konverter, der das Impulswahl- auf Mehrfrequenzwahlverfahren umsetzt. Die etwas ungewöhnliche Design-Entscheidung dabei: das Teil in Relaistechnik zu bauen! Freut euch auf blinkende Lichter und atmosphärisches Klackern. 😊Licensed to the public un…
  continue reading
 
I’ll show you how I use Go to run my entire home, including not just home automation but also tiny single-purpose appliances (with my gokrazy appliance platform, using a Raspberry Pi Zero 2W or larger), hosting private web services on mini PC servers, going all the way to a powerful 25 Gbit/s FTTH internet router which now serves all my web sites!S…
  continue reading
 
In diesem Vortrag stelle ich vor, wie atomare/immutable Linux-Desktops wie Fedora Silverblue und Bluefin durch ihre schreibgeschützte Systemarchitektur einen stabileren, sichereren und wartungsarmen Alltag ermöglichen. Basierend auf 1,5 Jahren praktischer Erfahrung zeige ich, wie ich mit dieser Technologie in Kombination mit Chezmoi für Konfigurati…
  continue reading
 
eBPF is transforming Linux system capabilities, enabling the extension of the kernel with custom process schedulers, firewalls, and more. Thanks to Java's recent native integration and a bit of compiler magic, we can now create these extensions directly in Java and use it to create Linux schedulers that create sound and schedulers that emit sound. …
  continue reading
 
In diesem Vortrag möchte ich zum einen zeigen, wie man (kleine) Large Language Models bei sich auf dem Laptop oder Smartphone laufen lassen kann, zum anderen, warum Large Language Models und deren Integration in alle möglichen Produkte eine eher nicht so gute Idee ist (freundlich formuliert: Wir setzen uns kritisch mit LLMs auseinander).Während des…
  continue reading
 
Infrastruktur - beispielsweise Brücken, Schienen, Glasfasern bis hin zu Servern - ist für viele ein (un)ausgesprochenes Problem: Zu wenig, zu schlecht, zu kaputt, zu teuer.In diesem Talk geht es um IT-Infrastruktur, mit besonderem Fokus auf Netzwerk.Ich baue und betreibe seit ca. 10 Jahren IT-Infrastruktur, und habe mit der Zeit festgestellt, dass …
  continue reading
 
Flash-Speicher sind mehr als nur passive Datencontainer – sie können aktive Sicherheitskomponenten sein. Dieser Vortrag zeigt, wie Maker und Profis gleichermaßen Flash-Technologien nutzen können, um Sicherheitsziele von der Verschlüsselung bis zum Secure Boot zu erreichen – selbst bei Systemen, die nicht für hohe Sicherheit konzipiert wurden.Flash-…
  continue reading
 
Mit dem Wunsch weniger Social Media und wieder mehr Blogs zu lesen, bin ich auf das IndieWeb gestoßen.IndieWeb ist eine Gemeinschaft von Menschen welche persönliche Websites zum verwalten von Inhalten im Internet verwenden, statt dies in zentralisierten sozialen Netzwerken zu tun. Neben Prinzipien wie POSSE (Publish (on your) Own Site, Syndicate El…
  continue reading
 
Die Anzeigetafeln an den Straßenbahnstationen sind sehr praktisch. Leider sieht man sie erst, wenn man schon an der Station ist.Ich zeige, wie man sich aus einem ESP8266-Mikrocontroller und einem E-Paper-Display eine eigene kleine Anzeige für den Hausflur baut und so schon früh weiss, dass man sich sputen sollte, wenn man die nächste Bahn noch erre…
  continue reading
 
Europarecht und auch Recht in Deutschland enthalten mehrere Möglichkeiten, an verschiedene Arten von Daten zu kommen: Der Data Act für IoT-Daten für jedes Wesen oder das Umweltinformationsgesetz für ... naja, Umweltinformationen oder auch so obskure Dinge wie das Geodatenzugangsgesetz. Neben dem bekannten Informationsfreiheitsgesetz gibt es eben vi…
  continue reading
 
Digital cameras are black-boxes during use: "you press the button, we do the rest". In this media archaeology project, I open this black box by disassembling an off-the-shelf DSLR camera as a case-study. I extract the image sensor, reverse engineer its interface, and build a new camera-apparatus around it. This lays technical groundwork for artists…
  continue reading
 
Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the M…
  continue reading
 
An historic data breach that wasn’t. Aflac says it stopped a ransomware attack. Cloudflare thwarts a record breaking DDoS attack. Mocha Manakin combines clever social engineering with custom-built malware. The Godfather Android trojan uses a sophisticated virtualization technique to hijack banking and crypto apps. A British expert on Russian inform…
  continue reading
 
Wolltet ihr schon immer mal einen Zug selbst steuern? Kein Problem!In diesem Talk schauen wir uns einen Angriff auf das europäische Zugbeeinflussungssystem ETCS an, mit dem es theoretisch möglich ist, Steuerungsnachrichten an einen Zug zu fälschen. Dabei betrachten wir die verschiedenen Protokollschichten in der Kommunikation zwischen Zug und Strec…
  continue reading
 
Digital tickets from traffic associations are often stuck inside their proprietary walled garden apps. But the neat thing about digital tickets, is that the barcode can be shown anywhere, and still be valid. This talk documents my efforts to reverse engineer various traffic association's apps, and my work on [Zügli](https://zügli.app) to make ticke…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play