A critical look at new technologies, new approaches and new ways of thinking, from politics to media to environmental sustainability.
…
continue reading
Future Secured Podcasts
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Sea Control is CIMSEC's Flagship podcast. We focus on maritime security, naval affairs, and defense and foreign policy.
…
continue reading
U.S. foreign policy for the future. Security Dilemma brings you conversations with the experts, policymakers, and thinkers charting new paths forward from the wreckage of recent decades and toward a national security and defense policy guided by prudence and restraint. Cohosts John Allen Gay and A.J. Manuzzi bring you the information you need to shape a wiser approach. Security Dilemma is a podcast of the John Quincy Adams Society, an independent nonprofit organization dedicated to advancing ...
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
A non-partisan podcast brought to you by Geopolitical Futures, an online publication founded by internationally recognized geopolitical forecaster George Friedman. Geopolitical Futures tells you what matters in international affairs and what doesn't. Go to https://geopoliticalfutures.com/podcast for details.
…
continue reading
The best in maritime security, technology, history, and international affairs from CIMSEC - your moment of power point rehab.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Security isn’t about luck—it’s about strategy. In this podcast, we break down how to protect your home, family, and business from threats most people don’t even think about. We’re not here to fuel fear—we’re here to help you prepare. Hosted by security professionals, Michael Johnson, a retired law enforcement captain with 29 years of experience and James Kerr an expert from Boss Security Screens, this podcast delivers real, no-nonsense advice. We know what truly stops burglars—not just locks ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC). Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy. It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates. Security & GRC ...
…
continue reading
Discover stories from real people who are living out their definition of a secure retirement.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
Stay up to date with the Nextcloud community!
…
continue reading
Interviews and Discussions With Fascinating People Who are Creating A Better Tomorrow For All Of Us - Host - Ira S. Pastor
…
continue reading
Welcome to Channel Security Secrets. Join host, Lou Rabon, each week to expose the untold secrets and critical insights from the minds shaping the future of cybersecurity sales in the trusted advisor channel. Channel Security Secrets is brought to you by Cyber Defense Group, on a mission to shift cybersecurity from reactive to resilient. Explore all episodes and resources at: https://www.cdg.io/podcast/
…
continue reading
Meet the leaders and companies powering the sustainable future.
…
continue reading
Significant international thinkers deliver the BBC's flagship annual lecture series
…
continue reading
China Insider is a weekly podcast project from Hudson Institute's China Center, hosted by Miles Yu, who provides weekly news that mainstream American outlets often miss, as well as in-depth commentary and analysis on the China challenge and the free world’s future.
…
continue reading
In this podcast, we delve into various aspects of cybersecurity, inviting global security leads to discuss trends, the impact of new concepts and regulations, talent retention, and more through one-on-one discussions.
…
continue reading
The Security Briefing is the official podcast from the organisers of The Security Event. Each episode brings together industry leaders, innovators, and frontline professionals to discuss the latest trends, technologies, and challenges shaping the future of security. From cyber to physical, strategy to innovation, this is your inside track on the issues that matter most to security professionals today.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
1
teissTalk: 2026 predictions for OT security and the future of cyber physical systems
43:18
43:18
Play later
Play later
Lists
Like
Liked
43:18Exploitable vulnerabilities within OT devices and how this is expected to change Cyber warfare risk in 2026 - how organisations can defend themselves Securing the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjord…
…
continue reading
1
A Vision For The Future Of Enterprise AI Security With Sanjay Poonen
27:30
27:30
Play later
Play later
Lists
Like
Liked
27:30Episode Summary The future of cyber resilience lies at the intersection of data protection, security, and AI. In this conversation, Cohesity CEO Sanjay Poonen joins Danny Allan to explore how organisations can unlock new value by unifying these domains. Sanjay outlines Cohesity’s evolution from data protection to security in the ransomware era, to …
…
continue reading
1
Building a Thriving Future: AI Ethics & Security in Virtual Worlds | Dr. Paola Cecchi - Dimeglio
56:03
56:03
Play later
Play later
Lists
Like
Liked
56:03The mistakes we made building the internet don't have to be repeated in the metaverse—if we act now. Join SecureTalk host Justin Beals for an essential conversation with Dr. Paola Cecchi-Dimeglio about building secure, ethical virtual worlds. Dr. Cecchi-Dimeglio brings 25 years of experience advising governments, Fortune 500 companies, and global i…
…
continue reading
1
HOU.SEC.CON Live: Merging Physical & Cyber Security + The Future of Threat Intelligence
19:49
19:49
Play later
Play later
Lists
Like
Liked
19:49🔥 Episode Summary Guests: Steve Lupo (Chevron, Retired FBI) & Orlan Streams (RA Infrastructure) Sponsor: CyberOne Security (www.cyberonesecurity.com) Recorded live at HOU.SEC.CON, this episode brings together two unique perspectives shaping the cybersecurity landscape. First, David speaks with Steve Lupo, Event Security Advisor at Chevron and a ret…
…
continue reading
1
Audit ≠ Security: Building Auditable Controls in a High-Velocity World ft Varun Prasad, Cloud Security & Privacy Assurance @ BDO
59:17
59:17
Play later
Play later
Lists
Like
Liked
59:17Audits are often misunderstood, frequently disliked, and almost always viewed as a necessary evil — but what if that mindset is holding security teams back? In this episode of Security & GRC Decoded, Raj Krishnamurthy sits down with Varun Prasad to unpack what audits are actually designed to do: provide reasonable assurance, not absolute security. …
…
continue reading
Power off! Nach vier wunderbaren Tagen kommt der Congress nun langsam zum Ende. Lasst uns zurückblicken, die Eindrücke sortieren und diese inspirierte Stimmung nach draußen tragen.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://events.ccc.de/congress/2025/hub/event/detail/closing-ceremony…
…
continue reading
Was hat sich im Jahr 2025 im Bereich IT-Sicherheit getan? Welche neuen Methoden, Buzzwords und Trends waren zu sehen? Was waren die fiesesten Angriffe und die teuersten Fehler?Wir wagen auch den IT-Security-Ausblick auf das Jahr 2026. Der ist wie immer mit Vorsicht zu genießen.Licensed to the public under http://creativecommons.org/licenses/by/4.0a…
…
continue reading
Infrastructure teams present what they did for this years congress and why they did it that way.39c3 is a big challenge to run, install power, network connectivity and other services in a short time and tear down everything even faster. This is a behind the scenes of the event infrastructure, what worked well and what might not have worked as expec…
…
continue reading
1
We, the EU, and 1064 Danes decided to look into YouTube: A story about how the EU gave us a law, 1064 Danes gave us their YouTube histories, and reality gave us a headache (39c3)
38:25
38:25
Play later
Play later
Lists
Like
Liked
38:25We explore what happens when Europe’s ambitious data access laws meet the messy realities of studying major digital platforms. Using YouTube as a central case, we show how the European Union’s efforts to promote transparency through the GDPR, the Digital Services Act (DSA), and the Digital Markets Act (DMA) are reshaping the possibilities and limit…
…
continue reading
1
Von Groschen und SpurLos - GNU Taler auch auf eurem Event! (39c3)
40:44
40:44
Play later
Play later
Lists
Like
Liked
40:44Willkommen in der Zukunft: Beim LUG Camp in Wipperfürth und bei den Datenspuren in Dresden wurde digital bezahlt - mit GNU Taler als Event-Bezahlsystem. Noch einfacher als Bargeld, billiger als Kartenzahlung und ohne Eingriff in die Privatsphäre der Besucher*innen. Wir zeigen euch, wie auch ihr das bei eurer nächsten (Chaos-)Veranstaltung anbieten …
…
continue reading
1
Breaking BOTS: Cheating at Blue Team CTFs with AI Speed-Runs (39c3)
40:27
40:27
Play later
Play later
Lists
Like
Liked
40:27After we announced our results, CTFs like Splunk's Boss of the SOC (BOTS) started prohibiting AI agents. For science & profit, we keep doing it anyways. In BOTS, the AIs solve most of it in under 10 minutes instead of taking the full day. Our recipe was surprisingly simple: Teach AI agents to self-plan their investigation steps, adapt their plans t…
…
continue reading
1
Battling Obsolescence – Keeping an 80s laser tag system alive (39c3)
42:41
42:41
Play later
Play later
Lists
Like
Liked
42:41Keeping old projects working can be an uphill battle. This talk explores how the laser tag system Q-Zar (Quasar in the UK) has been kept alive since the company behind it failed in the 90s. The challenges encountered, the lessons learnt, and how those can be applied to our own future projects to maximise the project lifetime.Looking at the effects …
…
continue reading
1
Laser Beams & Light Streams: Letting Hackers Go Pew Pew, Building Affordable Light-Based Hardware Security Tooling (39c3)
41:42
41:42
Play later
Play later
Lists
Like
Liked
41:42Stored memory in hardware has had a long history of being influenced by light, by design. For instance, as memory is represented by the series of transistors, and their physical state represents 1's and 0's, original EPROM memory could be erased via the utilization of UV light, in preparation for flashing new memory.Naturally, whilst useful, this h…
…
continue reading
1
Who runs the www? WSIS+20 and the future of Internet governance (39c3)
40:38
40:38
Play later
Play later
Lists
Like
Liked
40:38Abbreviations such as WSIS+20, IGF, IETF, DIEM, ICANN, PDP, ITU or W3C regularly appear in discussions about the Internet, yet often remain vague. This talk provides an update on the current state of Internet governance and explains why decisions made in United Nations processes have direct implications for technical standards, digital infrastructu…
…
continue reading
Der Hype um generative KI und die Gasindustrie bilden in Zeiten der Klimakrise eine bedrohliche Allianz für die Zukunft des Planeten.Obwohl die negativen Klimaauswirkungen generativer KI immer deutlicher werden, sollen in ganz Europa Großrechenzentren gebaut werden und Deutschland „KI-Nation“ werden, was ungeahnte „Wirtschaftskräfte freisetzen soll…
…
continue reading
1
CCC&T - Cosmic ray, the Climate Catastrophe and Trains. (39c3)
39:42
39:42
Play later
Play later
Lists
Like
Liked
39:42How can we predict soil moisture by measuring cosmic ray products and what have trains to do with it? Ever wondered how this Dürremonitor works, that you heared about in ther german news? These question and some more I will try to answer while I give an overview of some of the research that is done by the Helmholtz Centre for Environmental Research…
…
continue reading
1
CUII: Wie Konzerne heimlich Webseiten in Deutschland sperren (39c3)
40:22
40:22
Play later
Play later
Lists
Like
Liked
40:22Stellt euch vor, eine private Organisation aus milliardenschweren Konzernen entscheidet, welche Webseiten ihr nicht besuchen dürft - ohne Richter, ohne öffentliche Kontrolle oder Transparenz. Genau das macht die CUII in Deutschland seit Jahren.In Deutschland entscheidet eine private Organisation aus Internetanbietern und großen Unterhaltungskonzern…
…
continue reading
1
“End Of 10”: How the FOSS Community is Combatting Software-Driven Resource and Energy Consumption (39c3)
39:32
39:32
Play later
Play later
Lists
Like
Liked
39:32The end of free support for Windows 10 was 14 October 2025. Well, sort of. Microsoft moved the date to 2026, one more year the FOSS community can introduce users to sustainable software. 14 October is also KDE's birthday, International E-Waste Day, with International Repair Day following on 18 October. The irony is deep, but what is not ironic is t…
…
continue reading
1
What You Hack Is What You Mean: 35 Years of Wiring Sense into Text (39c3)
42:01
42:01
Play later
Play later
Lists
Like
Liked
42:01Encoding isn’t just for machines — it’s how humans shape meaning. This talk traces 35 years of hacking text through the Text Encoding Initiative (TEI), a community-driven, open-source standard for describing the deep structure of texts. We’ll explore how TEI turns literature, research, and even hacker lore into machine-readable, remixable data — an…
…
continue reading
1
How to keep Open Source open without leaving our communities open to threats (39c3)
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01The Four Freedoms (defined ~40 years ago) and the Four Opens (~15 years ago) for Open Source provided canonical definitions for what are the cornerstones of Open Source Software communities today. While the ethos still applies today, the cultural norms that blossomed to put it into practice are from an era with different challenges.To build a bette…
…
continue reading
1
Building a Scalable Business - Holiday Re-Air with Eric Brooker - Channel Security Secrets - Ep. #23
48:44
48:44
Play later
Play later
Lists
Like
Liked
48:44What happens when the channel stops treating sales like transactions, and starts treating people like relationships that compound? As we wrap up the year, we’re bringing back one of the most talked-about episodes of Channel Security Secrets, a New Year holiday re-air with Eric Brooker, Founder & CEO of The Channel Standard. In this conversation, Er…
…
continue reading
*What are atoms doing in space anyways?* This talk will provide a brief overview of applications of quantum technologies in space ranging from precise timing and inertial measurements to fundamental physics.Quantum technologies have seen a wide field of applications in medicine, geosciences, computing and communications, in many cases bridging the …
…
continue reading
1
Asahi Linux - Porting Linux to Apple Silicon (39c3)
37:56
37:56
Play later
Play later
Lists
Like
Liked
37:56In this talk, you will learn how Apple Silicon hardware differs from regular laptops or desktops.We'll cover how we reverse engineered the hardware without staring at disassembly but by using a thin hypervisor that traces all MMIO access and then wrote Linux drivers.We'll also talk about how upstreaming to the Linux kernel works and how we've signi…
…
continue reading
1
I Hated All The Cross-Stitch Software So I Made My Own: My Deranged Outsider Software Suite For Making Deranged Outsider Art (39c3)
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26I wanted to design beautiful header diagrams and ASCII tables suitable for stitching on throw pillows, but found existing tools for cross-stitch design to be all wrong. I made my own set of command-line tools for building this chunky, pixelated visual art. If you've never seen a cross-stitch sampler that had bitrot, this talk will fix it.Designing …
…
continue reading
Artificial intelligence is rewriting the rules of weather forecasting — spotting storms sooner, warning us faster, and increasing the potential to save lives. But cuts to NOAA and the National Weather Service threaten the very data that makes it possible. In this CyberMonday crossover with WAMU’s 1A, we hear from listeners as we return to an episod…
…
continue reading
1
Secure Talk Special Episode: "Building Secure Societies in the Age of Division: The Seven Lessons for Humanity Heading Into 2026"
31:00
31:00
Play later
Play later
Lists
Like
Liked
31:00"In 20 years, we transformed food allergy awareness from nonexistent to universal—no law required. What if we could do the same for data security and AI governance?" This special episode reveals how grassroots cultural shifts create lasting change, and why 2026 might be the year cybersecurity professionals become architects of something bigger than…
…
continue reading
1
Die große Datenschutz-, Datenpannen- und DS-GVO-Show (39c3)
1:34:21
1:34:21
Play later
Play later
Lists
Like
Liked
1:34:21Datenschutz darf auch Spaß machen, und alle können dabei etwas lernen, egal ob Einsteiger oder Profi-Hacker: Bei dem Datenschutz- und Datenpannen-Quiz kämpfen vier Kandidat:innen aus dem Publikum zusammen mit dem Publikum um den Sieg. Nicht nur Wissen rund um IT-Sicherheit und Datenschutz sondern auch eine schnelle Reaktion und das nötige Quäntchen…
…
continue reading
1
Spectre in the real world: Leaking your private data from the cloud with CPU vulnerabilities (39c3)
45:14
45:14
Play later
Play later
Lists
Like
Liked
45:14Transient execution CPU vulnerabilities, like Spectre, have been making headlines since 2018. However, their most common critique is that these types of vulnerabilities are not really practical. Even though it is cool to leak `/etc/shadow` with a CPU bug, it has limited real-world impact. In this talk, we take Spectre out for a walk and let it see …
…
continue reading
PRÜF! Prüfung Rettet übrigens Freiheit!Alles wird in Deutschland geprüft. Warum nicht auch mutmaßlich verfassungswidrige Parteien? Hier stelle ich vor, was PRÜF! anders machen will als bisherige Kampagnen.Wir haben eine Forderung: „Alle Parteien, die vom Verfassungsschutz als rechtsextremer Verdachtsfall oder gesichert rechtsextrem eingestuft werde…
…
continue reading
1
Verschlüsselung brechen durch physischen Zugriff - Smartphone Beschlagnahme durch Polizei (39c3)
38:16
38:16
Play later
Play later
Lists
Like
Liked
38:16Eine zwar profane Methode der Überwachung, die Polizeibehörden in Deutschland jedoch hunderttausendfach anwenden, ist das Auslesen von Daten beschlagnahmter Smartphones und Computer. Dazu nutzt die Polizei Sicherheitslücken der Geräte mithilfe forensischer Software von Herstellern wie Cellebrite oder Magnet aus. Die Verfassungsmäßigkeit der Rechtsg…
…
continue reading
1
Von Fuzzern zu Agenten: Entwicklung eines Cyber Reasoning Systems für die AIxCC (39c3)
52:47
52:47
Play later
Play later
Lists
Like
Liked
52:47Die AI Cyber Challenge (AIxCC) der DARPA hatte zum Ziel, die Grenzen der autonomen Cybersicherheit zu erweitern: Können AI-Systeme Software-Schwachstellen unabhängig, in Echtzeit und ohne menschliche Hilfe identifizieren, verifizieren und beheben?Im Laufe von zwei Jahren entwickelten Teams aus aller Welt „Cyber Reasoning Systems“ (CRS), die in der …
…
continue reading
1
Rowhammer in the Wild: Large-Scale Insights from FlippyR.AM (39c3)
40:26
40:26
Play later
Play later
Lists
Like
Liked
40:26Last year at 38c3, we gave a talk titled "Ten Years of Rowhammer: A Retrospect (and Path to the Future)."In this talk, we summarized 10 years of Rowhammer research and highlighted gaps in our understanding.For instance, although nearly all DRAM generations from DDR3 to DDR5 are vulnerable to the Rowhammer effect, we still do not know its real-world…
…
continue reading
1
Peep-Show für die Polizei. Staatliche Überwachung von Queers in Hamburger Toiletten bis 1980 (39c3)
57:47
57:47
Play later
Play later
Lists
Like
Liked
57:47Oder: Wie die Hamburger Polizei queere Menschen auf öffentlichen Toiletten observierte, und wie ein anonymes Kollektiv im Juli 1980 dieses Überwachungsystem wortwörtlich mit dem Hammer zerschlagen hat. Ein analoger Überwachungskrimi mit sauberen Städten, lichtscheuen Elementen, queerem Aktivismus, und kollektiver Selbstorganisation; und mit einer A…
…
continue reading
1
Human microservices at the Dutch Railways: modern architecture, ancient hardware? (39c3)
1:00:48
1:00:48
Play later
Play later
Lists
Like
Liked
1:00:48The Dutch railways have been operating an increasingly complicated network of trains for over 80 years. The task of overseeing it is far too complex for a single human. As such, a network of specifically scoped humans has been connected. Over time, computers and software have been introduced into the system, but today there is still a significant r…
…
continue reading
Science is hard and research into the usage of the Tor network is especially so. Since it was designed to counter suveillance, it gathering reliable information is difficult. As a consequence, the studies we do have, have yielded very different results.This talk investigates the root causes of contradicting studies by highlighting how slight change…
…
continue reading
1
The Spectrum - Hackspace Beyond Hacking (39c3)
37:32
37:32
Play later
Play later
Lists
Like
Liked
37:32The Spectrum is a newly founded queer-feminist, intersectional hackspace centering FLINTA+, disabled, and marginalized beings. We see hacking as playful exploration—of technology, art, and ideas—to reimagine what inclusion and collaboration can be. At 39C3, we share how awareness, accessibility, and transdisciplinary creation can transform communit…
…
continue reading
Let's have a (hopefully) final look at Diesel emission cheating. This technical talk summarizes what I learned by reverse-engineering dozens of engine ECU software, how I found and characterized "interesting logic" which, more often than not, ended up being a court-approved "defeat device".What started as a "curious investigation" in 2015 to obtain…
…
continue reading
1
The Heartbreak Machine: Nazis in the Echo Chamber (39c3)
44:51
44:51
Play later
Play later
Lists
Like
Liked
44:51WhiteDate ist eine Plattform weißer Suprematist:innen, die sich an Rassist:innen und Antisemit:innen richtet – und auf veralteter Infrastruktur basiert. Was die 8000 Mitglieder nicht wussten: Einige der Nazis flirteten dieses Jahr mit realistisch wirkenden Chatbots - und verliebten sich sogar in sie. Mit einer Kombination aus automatisierter Konver…
…
continue reading
1
Hegemony Eroding: Excavating Diversity in Latent Space (39c3)
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03Hegemony Eroding is an ongoing art project exploring how generative AI reflects and distorts cultural representation. Its name speaks to its core ambition: to bear witness to the slow erosion of Western cultural hegemony by exposing the cracks in which other cultures shine through.This talk will discuss the blurry boundary between legitimate cultur…
…
continue reading
1
Race conditions, transactions and free parking (39c3)
38:51
38:51
Play later
Play later
Lists
Like
Liked
38:51ORM's and/or developers don't understand databases, transactions, or concurrency.After the [Air France-KLM dataleak](https://media.ccc.de/v/37c3-lightningtalks-58027-air-france-klm-6-char-short-code) I kept repeating this was not a real hack, and confessed I always wanted to hack a system based on triggering race conditions because the lack of prop…
…
continue reading
1
Denkangebot: Rainer Mühlhoff über KI und autoritäre Sehnsüchte im Silicon Valley (39c3)
1:31:55
1:31:55
Play later
Play later
Lists
Like
Liked
1:31:55Der Hype um künstliche Intelligenz ist allgegenwärtig. Selbst Donald Trump postet KI-generierte Videos, in denen er sich wahlweise als Rockstar oder Kampfjetpilot inszeniert. Elon Musk prahlte öffentlich damit, dass in seinem "Department of Goverment Efficiency" der soziale Kahlschlag mit Unterstützung Künstlicher Intelligenz vorangetrieben wird. U…
…
continue reading
Wer nutzt in Deutschland Software von Palantir und wer hat das in naher Zukunft vor? Was sind die rechtlichen Voraussetzungen für den Einsatz solcher Analysewerkzeuge? Und was plant Innenminister Alexander Dobrindt in Sachen Palantir für die Polizeien des Bundes?Software von Palantir analysiert für Polizeien und Militär deren Daten – dafür lizenzie…
…
continue reading
1
Aber hier Leben? Nein danke! …oder doch? Wie wir der autoritären Zuspitzung begegnen können. (39c3)
57:49
57:49
Play later
Play later
Lists
Like
Liked
57:49Im Osten stehen nächstes Jahr schon wieder Wahlen an und schon wieder sieht alles danach aus, als ob die AfD eine Regierungsbeteiligung bekommen könnte. Ganz konkret: In Sachsen-Anhalt und Mecklenburg-Vorpommern. Nicht nur diese "rosigen" Aussichten, sondern auch aktuelle Bevölkerungsprognosen werfen gar kein günstiges Licht auf die Regionen. Linke…
…
continue reading
1
The Angry Path to Zen: AMD Zen Microcode Tools and Insights (39c3)
36:33
36:33
Play later
Play later
Lists
Like
Liked
36:33[EntrySign](https://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking) opened the door to custom microcode on AMD Zen CPUs earlier this year. Using a weakness in the signature verification we can load custom microcode updates and modify behavior of stock AMD Zen 1-5 CPUs. While AMD has released patches to address this…
…
continue reading
Agentic AI is the catch-all term for AI-enabled systems that propose to complete more or less complex tasks on their own, without stopping to ask permission or consent. What could go wrong? These systems are being integrated directly into operating systems and applications, like web browsers. This move represents a fundamental paradigm shift, trans…
…
continue reading
1
Build a Fake Phone, Find Real Bugs (39c3)
41:01
41:01
Play later
Play later
Lists
Like
Liked
41:01Mobile phones are central to everyday life: we communicate, entertain ourselves, and keep vast swaths of our digital lives on them. That ubiquity makes high-risk groups such as journalists, activists, and dissidents prime targets for sophisticated spyware that exploits device vulnerabilities.On Android devices, GPU drivers have repeatedly served as…
…
continue reading
1
Netzpolitik in der Schweiz: Zwischen Bodensee und Matterhorn (39c3)
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09Auch in der Schweizer Netzpolitik ging es im auslaufenden Jahr drunter und drüber. Wir blicken mit gewohntem Schalk auf das netzpolitische Jahr 2025 zwischen Bodensee und Matterhorn zurück - und diskutieren jene Themen, die relevant waren und relevant bleiben.**Themen sind unter anderem:****E-ID und E-Collecting:** Die netzpolitische Community hat …
…
continue reading
1
WissPod Jahresrückblick 2025 oder: KI in der Wissenschaft!? (39c3)
1:29:13
1:29:13
Play later
Play later
Lists
Like
Liked
1:29:13Wie die letzten Jahre gute Tradition geworden ist, blicken Melanie Bartos und Bernd Rupp zurück auf das wissenschaftspodcasts.de-Jahr 2025 und sprechen über die Perspektiven, die sich für das Wissenschaftspodcast-Jahr 2026 abzeichnen.Dabei beleuchten wir die Herausforderungen bei der Kuration, die Anmeldezahlen neuer Wissenschaftspodcasts, die Weit…
…
continue reading
1
The Modular Workshop – The Tunegirl und Rob StrobE (39c3)
59:05
59:05
Play later
Play later
Lists
Like
Liked
59:05Hallo CCC Community,wir präsentieren euch The Tunegirl und Rob StrobE, beide sind mit Veröffentlichungen auf dem Assassins Soldier Label beheimatet und blicken auf eine gemeinsame Liebe für Detroit Techno.Die Idee zum gemeinsamen Workshop für euch entstand natürlich auf dem Dancefloor und The Tunegirl hat die Cases gepackt und nach Hamburg gebracht…
…
continue reading