Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Best Episodes
Ep 39: 3 Alarm Lamp Scooter
A talk at Defcon challenged people to find a way to destroy a hard drive. A young man was inspired by this challenge ...
Ep 46: XBox Underground (Part 2)
This is the story about the XBox hacking scene and how a group of guys pushed their luck a little too far.This is par...
Ep 38: Dark Caracal
A journalist wrote articles critical of the Kazakhstan government. The government did not like this and attempted to ...
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
Best Episodes
Security is Alive
Every now and then you need to try something new. That's what this episode is. If you listened to Season 2 Episode 3...
Quick announcement and sneak peek of my new show: Digital...
Hey all!An announcement and something special!First the announcement:Here's your chance to participate in the fin...
Season 3 finale: What's the deal with Authentication MFA...
For the last episode of season 3 I thought we'd talk about something that's been in the news quite a lot recently: A...
The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.
Best Episodes
The WANK Worm Part 2
After the Challenger Disaster of 1986 NASA had a hard time convincing the public that the Galileo spacecraft fueled...
The U.S vs. Gary McKinnon
After the Challenger Disaster of 1986 NASA had a hard time convincing the public that the Galileo spacecraft fueled...
The WANK Worm Part 1
On October 16th 1989 NASA's scientists went into work preparing to launch a spacecraft that very day. But when the...
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
Best Episodes
The Grugq
Ben Makuch sits down with one of InfoSec’s only true celebrities: The Grugq (who recently added the name ‘Thaddeus’ t...
Who’s Afraid of Huawei?
In this week's CYBER podcast we spoke to VICE News reporter William Turnton who just spent a week in China as part ...
Why There’s No Need to Panic About a ‘Cyber 9/11’
On this week's episode of CYBER we spoke to Robert Lee a former NSA analyst and infrastructure hacking expert abou...
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Best Episodes
Risky Business #595 -- NSA and FBI document GRU's Linux m...
On this week’s show Patrick Adam and Sherrod DeGrippo discuss the week’s security news including: NSA and FBI d...
Risky Biz Soap Box: Rolling your own threat intelligence ...
In this edition of the soap box we’re chatting with Steve Miller a threat researcher at Stairwell. Steve has a long ...
Risky Business #692 -- Google search results spew malware...
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news including: Google’s search re...
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Best Episodes
Andy Greenberg Interview: Tracers in the Dark. [CSO Persp...
Rick Howard N2K’s CSO and the CyberWire’s Chief Analyst and Senior Fellow interviews Andy Greenberg Senior Writer...
Alleged leaked files expose a dirty secret.
An alleged leak of Google’s search algorithm contradicts the company’s public statements. German researchers discove...
The mother of all data breaches.
The mother of all data breaches. CISA director Easterly is the victim of a swatting incident. An AI robocall in New H...
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.
Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
Best Episodes
SN 906: The Rule of Two - Norton Lifelock Data Breach Ch...
Picture of the Week About Password Iterations EBC or CB Norton Lifelock Troubles Chrome Follows Microsoft and F...
SN 905: 1 - LastPass Aftermath LastPass vault de-obfusca...
Picture of the Week. LastPass Aftermath. LastPass Vault De-Obfuscator. What more do we know this week regarding ...
SN 904: Leaving LastPass - How LastPass failed Steve's n...
Picture of the Week. SpinRite. Leaving LastPass. Is there reason for concern? Well known password cracker Jerem...
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...
Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over seven million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones.
Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
Best Episodes
155: Juice jacking YouTube hacking password slacking
A bank has some of the worst password advice ever travellers are told to be wary when USB charging their smartphones...
170: PornHub Coronavirus apps and remote working
It's a self-isolated Coronavirus special as we discuss with our quarantined special guest how COVID-19 is making itse...
294: The Virgin trains swindler cyber clowns and AirTag...
Someone's election-fiddling is uncovered with an Apple AirTag a cyber scandal rocks Germany and a swindler steals a...
Deception, influence, and social engineering in the world of cyber crime.
Best Episodes
The age old battle between social engineering and banking.
Chip Gibbons CISO at Thrive sits down with Dave to talk about how to defend against social engineering attacks in b...
The age old battle between social engineering and banking.
Chip Gibbons CISO at Thrive sits down with Dave to talk about how to defend against social engineering attacks in b...
How to avoid Instagram scams.
This week Carole Theriault sits down to interview Dr. Jessica Barker from Cygenta to discuss the latest Instagram sc...
Deception, influence, and social engineering in the world of cyber crime.
Best Episodes
The age old battle between social engineering and banking.
Chip Gibbons CISO at Thrive sits down with Dave to talk about how to defend against social engineering attacks in b...
The age old battle between social engineering and banking.
Chip Gibbons CISO at Thrive sits down with Dave to talk about how to defend against social engineering attacks in b...
How to avoid Instagram scams.
This week Carole Theriault sits down to interview Dr. Jessica Barker from Cygenta to discuss the latest Instagram sc...
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
Best Episodes
Ep. 162 - Security Awareness Series - What Cows Can Teach...
This month Chris Hadnagy and Ryan MacDougall are joined by John Strand from Black Hills Information Security. John ...
Ep. 032 - Non-Verbal Human Hacking
Emotions cause an involuntary muscular response that last only 1/25th of second to 1 sec on a human face. Being able ...
Ep. 144 - Adaptive Problem Solving with Ashley Rose
In this episode of the SECurity Awareness Series of the SEPodcast Chris Hadnagy and Ryan MacDougall are joined by A...
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
Best Episodes
Analyzing the CrowdStrike Incident and Its Ripple Effects...
In this episode of Security Weekly News Dr. Doug White and Josh Marpet delve into the widespread impact of the recen...
Executive Interviews from RSAC! - ESW #361
Tune in to hear 9 executive interviews from RSA Conference 2024 featuring speakers from Zscaler Open Systems Aryak...
Advising The President On Cyber-Physical Resilience - Phi...
On February 27 2024 PCAST (President’s Council of Advisors on Science and Technology) sent a report to the Presiden...
We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
Best Episodes
Financial Independence & Freedom with Eddie Thomason
Eddie Thomason bestselling author speaker consultant and creator of the Simply Secure podcast comes to Hacker Va...
Unleashing the Power of Cybersecurity Purple Teams with M...
In this episode of the podcast Maril Vernon joins Ron and Chris and discusses the importance of breaking down silos ...
The Art of Creating Cybersecurity Content With Jason Rebholz
In this episode host Ron is joined by the CISO at Corvus Insurance Jason Rebholz to talk about the life of being a...
Welcome to Lock and Code, a Malwarebytes cybersecurity podcast. Every two weeks, we dig deep into cybersecurity’s most vexing topics, speaking to the researchers and engineers at Malwarebytes, as well external guests from major companies and organizations. Whether analyzing deepfakes, guarding data privacy, debunking VPN myths, or simply understanding how a garage door opener can be easily hacked, we’re here to learn about it all.
Best Episodes
Why does technology no longer excite?
When did technology last excite you? If Douglas Adams author of The Hitchhiker's Guide to the Galaxy is to be beli...
Security advisories are falling short. Here’s why with D...
Decades ago patching was to lean into a corny joke a bit patchy. In the late 90s the Microsoft operating system ...
Chasing cryptocurrency through cyberspace with Brian Carter
On June 7 2021 the US Department of Justice announced a breakthrough: Less than one month after the oil and gas pip...