Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Best Episodes
Ep 39: 3 Alarm Lamp Scooter
A talk at Defcon challenged people to find a way to destroy a hard drive. A young man was inspired by this challenge ...
Ep 46: XBox Underground (Part 2)
This is the story about the XBox hacking scene and how a group of guys pushed their luck a little too far.This is pa...
Ep 38: Dark Caracal
A journalist wrote articles critical of the Kazakhstan government. The government did not like this and attempted to ...
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
Best Episodes
Security is Alive
Every now and then you need to try something new. That's what this episode is. If you listened to Season 2 Episode 3...
Quick announcement and sneak peek of my new show: Digital...
Hey all!An announcement and something special!First the announcement:Here's your chance to participate in the fin...
World's Greatest Con – A Conversation with Brian Brushwood
If you love learning about cons scams and tricks then this is the episode for you. Listen as Perry sits down with ...
The wildest computer hacks you could ever imagine. 500 million dollars disappear into thin air. Two teenagers disrupt a rocket launch. Foreign spies rig an election. Hosted by author and cybersecurity expert Ran Levi, Malicious Life unravels complex, dramatic historical events, with interviews from people who were actually there. Lock your door, wipe your hard drive, and come listen to fascinating stories from the cyber underground.
Best Episodes
The WANK Worm Part 2
After the Challenger Disaster of 1986 NASA had a hard time convincing the public that the Galileo spacecraft fueled...
The U.S vs. Gary McKinnon
After the Challenger Disaster of 1986 NASA had a hard time convincing the public that the Galileo spacecraft fueled...
The WANK Worm Part 1
On October 16th 1989 NASA's scientists went into work preparing to launch a spacecraft that very day. But when the...
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
Best Episodes
The Grugq
Ben Makuch sits down with one of InfoSec’s only true celebrities: The Grugq (who recently added the name ‘Thaddeus’ t...
Who’s Afraid of Huawei?
In this week's CYBER podcast we spoke to VICE News reporter William Turnton who just spent a week in China as part ...
Why There’s No Need to Panic About a ‘Cyber 9/11’
On this week's episode of CYBER we spoke to Robert Lee a former NSA analyst and infrastructure hacking expert abou...
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Best Episodes
Risky Business #595 -- NSA and FBI document GRU's Linux m...
On this week’s show Patrick Adam and Sherrod DeGrippo discuss the week’s security news including: NSA and FBI d...
Risky Biz Soap Box: Rolling your own threat intelligence ...
In this edition of the soap box we’re chatting with Steve Miller a threat researcher at Stairwell. Steve has a long ...
Risky Business #692 -- Google search results spew malware...
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news including: Google’s search re...
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Best Episodes
Cybersecurity during the World Cup. [Research Saturday]
AJ Nash from ZeroFox sits down with Dave to discuss Cybersecurity threats including social engineering attacks planne...
Debunking deepfakes. Hacktivism and information warfare. ...
Not-so-deepfakes debunked. Hacktivism and information warfare in Russia’s war against Ukraine. The prospect of an age...
Ukrainian President Zelenskyy addresses the US Congress ...
Ukrainian President Zelenskyy addresses the US Congress as intelligence services contractors and hacktivists wage ...
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte.
Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
Best Episodes
SN 906: The Rule of Two - Norton Lifelock Data Breach Ch...
Picture of the Week About Password Iterations EBC or CB Norton Lifelock Troubles Chrome Follows Microsoft and F...
SN 904: Leaving LastPass - How LastPass failed Steve's n...
Picture of the Week. SpinRite. Leaving LastPass. Is there reason for concern? Well known password cracker Jerem...
SN 905: 1 - LastPass Aftermath LastPass vault de-obfusca...
Picture of the Week. LastPass Aftermath. LastPass Vault De-Obfuscator. What more do we know this week regarding ...
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...
Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over seven million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones.
Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
Best Episodes
155: Juice jacking YouTube hacking password slacking
A bank has some of the worst password advice ever travellers are told to be wary when USB charging their smartphones...
170: PornHub Coronavirus apps and remote working
It's a self-isolated Coronavirus special as we discuss with our quarantined special guest how COVID-19 is making itse...
226: Cryptocrazies and NFTs
How did the SCAM cryptocurrency become a success? Why is Google allowing government rip-off ads to still appear on se...
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
Best Episodes
287-Listener Questions UNREDACTED 5 & OSINT 10
This week I present the latest issue of UNREDACTED Magazine publish my new OSINT book and tackle numerous listener ...
285-Travel Security Revisited
This week Jason joins me to revisit travel security protocols. If you have travel planned this holiday season consid...
284-Password Managers & 2FA Revisited
This week I revisit the importance of password managers and 2FA and offer new Bitwarden strategies for daily usage....
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
Best Episodes
PSW #767 - Holiday Extravaganza
While we most likely do not believe that penetration testing is dead it continues to evolve over time. What do penetr...
ASW #222 - Aviv Grafi
Android platform certs leaked SQL injection to leaked credentials to cross-tenant access in IBM's Cloud Database ha...
SWN #265 - Virtual Smells Werfault 2012 ChatGPT Captc...
This week in the Security News: Virtual Smells Werfault Server 2012 ChatGPT Captcha Rust Hyper Qualcomm and mo...
Deception, influence, and social engineering in the world of cyber crime.
Best Episodes
How to avoid Instagram scams.
This week Carole Theriault sits down to interview Dr. Jessica Barker from Cygenta to discuss the latest Instagram sc...
How to avoid Instagram scams.
This week Carole Theriault sits down to interview Dr. Jessica Barker from Cygenta to discuss the latest Instagram sc...
Keeping the scams in the family. [Hacking Humans Goes to ...
Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans the Cybe...
Deception, influence, and social engineering in the world of cyber crime.
Best Episodes
How to avoid Instagram scams.
This week Carole Theriault sits down to interview Dr. Jessica Barker from Cygenta to discuss the latest Instagram sc...
How to avoid Instagram scams.
This week Carole Theriault sits down to interview Dr. Jessica Barker from Cygenta to discuss the latest Instagram sc...
Keeping the scams in the family. [Hacking Humans Goes to ...
Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans the Cybe...
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
Best Episodes
Ep. 162 - Security Awareness Series - What Cows Can Teach...
This month Chris Hadnagy and Ryan MacDougall are joined by John Strand from Black Hills Information Security. John ...
Ep. 032 - Non-Verbal Human Hacking
Emotions cause an involuntary muscular response that last only 1/25th of second to 1 sec on a human face. Being able ...
Ep. 144 - Adaptive Problem Solving with Ashley Rose
In this episode of the SECurity Awareness Series of the SEPodcast Chris Hadnagy and Ryan MacDougall are joined by A...
We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
Best Episodes
Financial Independence & Freedom with Eddie Thomason
Eddie Thomason bestselling author speaker consultant and creator of the Simply Secure podcast comes to Hacker Va...
Unleashing the Power of Cybersecurity Purple Teams with M...
In this episode of the podcast Maril Vernon joins Ron and Chris and discusses the importance of breaking down silos ...
Security Teams Can’t Do It All with Rob Wood CISO @ CMS
In this episode of Hacker Valley Studio Rob Wood Chief Information Security Officer (CISO) at CMS discusses the ch...
Welcome to Lock and Code, a Malwarebytes cybersecurity podcast. Every two weeks, we dig deep into cybersecurity’s most vexing topics, speaking to the researchers and engineers at Malwarebytes, as well external guests from major companies and organizations. Whether analyzing deepfakes, guarding data privacy, debunking VPN myths, or simply understanding how a garage door opener can be easily hacked, we’re here to learn about it all.
Best Episodes
Why does technology no longer excite?
When did technology last excite you? If Douglas Adams author of The Hitchhiker's Guide to the Galaxy is to be beli...
Security advisories are falling short. Here’s why with D...
Decades ago patching was to lean into a corny joke a bit patchy. In the late 90s the Microsoft operating system ...
Strengthening and forgetting passwords with Matt Davey an...
We may know it’s important to have a strong non-guessable lengthy password and yet we still probably all know some...