Tales of supernatural horror and suspense, old and new, are brought to life in this series of audio narrations enhanced with spinetingling music and sound effects. Featuring stories by acknowledged masters of the genre like M. R. James, E. F. Benson and H. P. Lovecraft, alongside lesser-known authors of the early 20th century waiting to be rediscovered and contemporary talents, The EnCrypted Horror Podcast is your new home for horror, curated, read and produced by Jasper L'Estrange. Subscrib ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
…
continue reading
Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
Music and Words but mostly Bass.
…
continue reading
Welcome to Uncanny Valley—an insider look at the people, power, and influence of Silicon Valley– where each week, WIRED’s writers and editors bring you original reporting and analysis about some of the biggest stories in tech. On Tuesdays, WIRED’s Zoë Schiffer has an urgent conversation about this week in the news. And on Thursdays, WIRED’s Global Editorial Director Katie Drummond is joined by Lauren Goode, Michael Calore, to break down a recent story or phenomena bubbling up in Silicon Vall ...
…
continue reading
The Vanished is a true crime podcast that explores the stories of those who have gone missing. The Vanished goes beyond conventional news reports to take a deep dive into the story of a different missing person each week. Host Marissa Jones brings you exclusive interviews with family members, friends, law enforcement and experts. What will The Vanished uncover next? Listen to The Vanished on the Wondery App or wherever you get your podcasts. You can listen to all episodes ad-free on Wondery+ ...
…
continue reading
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
…
continue reading
Scramblex.com has released a free encryption service that will protect sensitive data from unauthorised access and the potential for identity or financial theft.
…
continue reading
Tom Merritt and the team help you stay up to date with an independent, authoritative and trustworthy tech news briefing. Become a member at https://plus.acast.com/s/dtns. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The officially unofficial podcast for Mr. Robot on USA. Each week we hack into the episode with a full recap and listener feedback.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Simplified Privacy Podcast on VPNs, Linux, Browsers, Digital Agora, Crypto-Anarchy, Nostr, Arweave, Bastyon, and Libertarian Politics. Encryption as Identity!
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
A new beginning in IT
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
Exploring the bonds shared between people and technology
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Tech policy is at the center of the hottest debates in American law and politics. On the Tech Policy Podcast, host Corbin Barthold discusses the latest developments with some of the tech world's best journalists, lawyers, academics, and more.
…
continue reading
HawkShield is a Singapore-based, data and network security provider. We offer AI-powered data security and privacy services to companies of different sizes and industries. Contact us today. https://www.hawkshield.ai/
…
continue reading
Unraveling the technology that affects us all but that few of us understand, in a format to give you a basic understanding in the time it takes to drive to and from the grocery store.
…
continue reading
Audio versions of new articles as they’re posted on http://askleo.com
…
continue reading
Listen to articles handpicked by our editors, and stay updated on top technology news from TechCrunch.
…
continue reading
We started Tech Gumbo in Nov 2014 as a conversational show of news, information & updates about the past, present & future of all things technology in a topical, interesting and digestible way.
…
continue reading
The talk of the Apple Community
…
continue reading
The Fren Zone brings you the brightest technical minds in crypto and web3. Join our host Mason as he goes on a technical deep dive with cutting-edge projects building new and novel technology. Twitter: @tokensoftinc
…
continue reading
🎙️ Ready to enhance your reading experience? Let eShare.ai transform our insightful blogs into captivating audio podcasts! 📚🔊 Get ready to listen and learn on the go! 🚗🎧
…
continue reading

1
How Do I Know If My Hard Disk Is BitLocker-Encrypted?
6:46
6:46
Play later
Play later
Lists
Like
Liked
6:46Your hard disk could be BitLocker encrypted without your knowledge.
…
continue reading

1
Florida draft law mandating encryption backdoors for social media accounts billed ‘dangerous and dumb’
3:34
3:34
Play later
Play later
Lists
Like
Liked
3:34A digital rights group blasted the Florida bill, but lawmakers voted to advanced the draft law. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading
What is the secret of the curiously empty seat on the Embankment between the Avenue and Westminster Bridge?This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “ON THE EMBANKMENT” by Hugh E. Wright (1919).CREATOR’S NOTE: Due to some copyright confusion, Spotify have alerted me to the fact that 61 episodes of t…
…
continue reading

1
404: The Worst Possible Moment to Break Encryption
53:25
53:25
Play later
Play later
Lists
Like
Liked
53:25Corbin Barthold (TechFreedom) discusses the recent spate of attacks on end-to-end encryption—and free speech more broadly—in the United Kingdom and United States. Links: U.K. Orders Apple to Let It Spy on Users’ Encrypted Accounts Tech Policy Podcast 356: The UK Targets End-to-End Encryption The UK’s state-funded anti-encryption propaganda The UK H…
…
continue reading

1
Episode 10.14 - Encryption, Insurance and why you should care
28:26
28:26
Play later
Play later
Lists
Like
Liked
28:26When it comes to polite discussion, there are two things you should never discuss: Politics and Religion. At the same time, most people would also rather not talk about insurance or data encryption. Well, I can’t say I’m all that polite, because that is exactly what this episode is about. The need for encryption on or data has never been more impor…
…
continue reading

1
SANS Stormcast Thursday Apr 3rd: Juniper Password Scans; Hacking Call Records; End to End Encrypted GMail
9:23
9:23
Play later
Play later
Lists
Like
Liked
9:23Surge in Scans for Juniper t128 Default User Lasst week, we dedtect a significant surge in ssh scans for the username t128 . This user is used by Juniper s Session Smart Routing, a product they acquired from 128 Technologies which is the reason for the somewhat unusual username. https://isc.sans.edu/diary/Surge%20in%20Scans%20for%20Juniper%20%22t12…
…
continue reading

1
The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in the cybersecurity industry, and the recent launch of the CVE Foundation. We also discuss the Trump Administration’s executive order that revoked the security clearan…
…
continue reading

1
SANS Stormcast Monday, April 28th: Image Steganography; SAP Netweaver Exploited
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
…
continue reading
We'll look at how to display hidden files and folders in Windows Explorer.
…
continue reading

1
Government censorship comes to Bluesky, but not its third-party apps … yet
5:50
5:50
Play later
Play later
Lists
Like
Liked
5:50Government censorship has found its way to Bluesky, but there’s currently a loophole thanks to how the social network is structured. Earlier this month, Bluesky restricted access to 72 accounts in Turkey at the request of Turkish governmental authorities, according to a recent report by the Freedom of Expression Association. Learn more about your a…
…
continue reading

1
Episode 10.16 - RSAC preview, Government doing good and bad PR
11:53
11:53
Play later
Play later
Lists
Like
Liked
11:53This is a short episode previewing what I'll be doing at RSAC 2025 next week, kudos to the California Franchise Tax Board, and a how-to on working with the press.
…
continue reading

1
MacVoices #25120: Live! - Tim Cook's Influence, Apple's Sports App, Meta's Redaction Fail
25:04
25:04
Play later
Play later
Lists
Like
Liked
25:04The panel of Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Marty Jencius, and Eric Bolden discuss Tim Cook’s strategic influence in securing tariff exemptions, highlighting his low-key leadership style focused on Apple’s interests. They explore updates to Apple’s Sports app, praising its clean interface and new sharing features. The convers…
…
continue reading

1
Is that $20,000 Modular EV for Real? - DTNSB 5006
31:13
31:13
Play later
Play later
Lists
Like
Liked
31:13Plus, how YouTube is the hope for Google, and maybe TSMC is the hope for Intel. Starring Tom Merritt, and Huyen Tue Dao, and Bodie Grimm. Show notes can be found here. Become a member at https://plus.acast.com/s/dtns. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
How Does Security Software Protect Me After Windows 10 End of Support?
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Security updates and security software have different jobs, and that difference matters.
…
continue reading

1
S17 E01 (VIDEO) Why Your Browser Is Your Biggest Risk
41:05
41:05
Play later
Play later
Lists
Like
Liked
41:05#SecurityConfidential #DarkRhiinoSecurityJohn Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security progra…
…
continue reading

1
Top Ways to Get Cheap Cloud Storage with Security
5:22
5:22
Play later
Play later
Lists
Like
Liked
5:22Explore easy tips to choose cheap cloud storage that keeps your files safe. Budget-friendly doesn’t have to mean weak on privacy or protection.
…
continue reading

1
Linktree rolls out a suite of monetization features for creators
4:09
4:09
Play later
Play later
Lists
Like
Liked
4:09Linktree is launching a set of new features aimed at helping creators earn more money directly from its platform. The new tools include the ability to sell courses and digital products, earn from brand-sponsored links, and build shoppable storefronts. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
…
continue reading
Watchman Privacy Says He's Gonna Quit. Let's talk him out of it.
…
continue reading

1
MacVoices #25119: NAB Show - DJI's Latest Gimbles and Mic System
20:53
20:53
Play later
Play later
Lists
Like
Liked
20:53At NAB Show 2025, Donovan Davis, Product Specialist for Osmo for DJI showcases the Osmo Mobile 7 gamble with a new tracking module that works with any app, built-in tripod, lighting controls, and 10-hour battery life. The DJI Mic Mini offers compact wireless audio with Bluetooth and receiver options. The RS-4 Mini gimbal supports both smartphones a…
…
continue reading

1
The U.S. doesn’t refine cobalt. This startup wants to change that.
3:08
3:08
Play later
Play later
Lists
Like
Liked
3:08Xerion says it has a new technique to produce highly refined cobalt in a single step. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
EU mandates new labels for device repairability and battery life - DTNSB 5005
29:33
29:33
Play later
Play later
Lists
Like
Liked
29:33Adobe updates its Firefly generative model with vector image support, and Tom talks with Sean Hollister about toilet tech in Japan. Starring Jason Howell, and Huyen Tue Dao, and Sean Hollister. Show notes can be found here. Become a member at https://plus.acast.com/s/dtns. Hosted on Acast. See acast.com/privacy for more information.…
…
continue reading

1
Crowdsourced AI benchmarks have serious flaws, some experts say
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29AI labs are increasingly relying on crowdsourced benchmarking platforms such as Chatbot Arena to probe the strengths and weaknesses of their latest models. But some experts say that there are serious problems with this approach from an ethical and academic perspective. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading

1
Protecting Your Phone—and Your Privacy—at the US Border
39:16
39:16
Play later
Play later
Lists
Like
Liked
39:16Under the new Trump administration, more and more visa holders and foreign visitors are being detained or denied entry at the border. It’s also becoming more common for people to be questioned or detained because of content on their phones, laptops and cameras. In today’s episode, we’ll tell you what you need to know about your carrying devices acr…
…
continue reading

1
Interview w/ Corey Clothier, Autonomous Vehicle Expert with Arcadis
22:39
22:39
Play later
Play later
Lists
Like
Liked
22:39Top Story: Corey Clothier tells us about autonomous vehicles: The history of autonomous vehicles Where and how robotaxis work The future and what autonomous vehicles will look like in the coming yearsBy Haggai Davis
…
continue reading

1
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
…
continue reading

1
S17 E01 Why Your Browser Is Your Biggest Risk
41:05
41:05
Play later
Play later
Lists
Like
Liked
41:05John Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security programs across finance, tech, and e-commerce. …
…
continue reading

1
Tariff turmoil may have killed the tech M&A market’s comeback
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41The tech market doesn’t need to be soaring up and to the right to foster healthy M&A activity. Deals can get done even in down markets. But can M&A thrive in an uncertain market? That’s a harder question. The venture market soured in 2022 as fundraising and exits largely dried up Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading

1
A New Color You Can Never See - DTNSB 5004
30:01
30:01
Play later
Play later
Lists
Like
Liked
30:01Plus, Europe drops its first fines against Apple and Meta for violating the Digital Markets Act. Starring Tom Merritt, Jenn Cutter, and Dr Niki. Links to stories can be found here. Become a member at https://plus.acast.com/s/dtns. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
MacVoices #25118: TV+ Talk - TV+ Talk Is Back!
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Apple TV+ earns two Peabody nominations for powerful documentaries “Bread and Roses” and “The Last of the Sea Women,” but hosts Chuck Joiner and Charlotte Henry express frustration over Apple’s poor promotion of its content. They praise Apple’s overall documentary quality yet note how many shows go under the radar. The conversation also covers the …
…
continue reading
It's time to start thinking about what AI can do for you.
…
continue reading
Enabling Firefox's Tab Grouping. Recalled Recall Re-Rolls out. The crucial CVE program nearly died. It's been given new life. China confesses to hacking the US (blames our stance on Taiwan). CISA says what Oracle still refuses to. Brute force attacks on the (rapid) rise. An AI/ML Python package rates a 9.8 (again!) The CA/Browser forum passed short…
…
continue reading