show episodes
 
T
The Daily

1
The Daily

The New York Times

Unsubscribe
Unsubscribe
Daily
 
This is what the news should sound like. The biggest stories of our time, told by the best journalists in the world. Hosted by Michael Barbaro and Sabrina Tavernise. Twenty minutes a day, five days a week, ready by 6 a.m. Listen to this podcast in New York Times Audio, our new iOS app for news subscribers. Download now at nytimes.com/audioapp
  continue reading
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Meduza’s English-language podcast, The Naked Pravda highlights how our top reporting intersects with the wider research and expertise that exists about Russia. The broader context of Meduza’s in-depth, original journalism isn’t always clear, which is where this show comes in. Here you’ll hear from the world’s community of Russia experts, activists, and reporters about issues that are at the heart of Meduza’s stories and crucial to major events in and around Russia.
  continue reading
 
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
  continue reading
 
An award-winning, original, investigative series made by the team behind the acclaimed PBS documentary show, FRONTLINE. From the long and deadly arm of 9/11, to a police shooting in West Virginia with a startling twist, to what life is really like for children living in a Kenyan refugee camp, each episode follows a different reporter through an investigation that sometimes is years in the making. The FRONTLINE Dispatch – because some stories are meant to be heard. Produced at FRONTLINE’s hea ...
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
S
Smashing Security

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
  continue reading
 
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you! Got questions/suggestions/stories to share? Email: tips@sophos.com Twitter: @NakedSecurity Instagram: @NakedSecurity
  continue reading
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Apple is more than just the iPhone manufacturer. This $2 trillion company's decisions impact many facets of technology, financials, and everyday life. When the company is rumored to be getting into something new, the entire world pays attention. And since 1997, AppleInsider has been covering this fascinating electronics maker from every possible angle. From details of the next-generation iPhone and MacBook to key indicators expected to drive the company’s stock price, AppleInsider Daily has ...
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
“It’s 5:05!'' is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won't have to. Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you fin ...
  continue reading
 
T
Tech Mirror

1
Tech Mirror

Tech Policy Design Centre

Unsubscribe
Unsubscribe
Monthly
 
“How do we ensure technology makes our lives better?” Tech Mirror: Reflecting on technology and society with Johanna Weaver explores how technology impacts our lives: the good, the bad, the ugly and the beautiful. Technology is made by humans. When we refocus on this foundational truth, it opens the possibility that technology can be made differently. Questions about how we might shape technology differently are not just “technical” questions. The answers to these questions go to the very co ...
  continue reading
 
U
Untold: The Daniel Morgan Murder

151
Untold: The Daniel Morgan Murder

Duende Productions and Flameflower Studios

Unsubscribe
Unsubscribe
Monthly
 
The phone hacking scandal that closed News of the World was big, but that was just the tip of the iceberg. At the bottom of that iceberg of 'dark arts' - hacking, burglary, bugging, and bribing bent cops - is the body of Daniel Morgan. It’s been described by an Assistant Commissioner of the Metropolitan Police as “one of the most disgraceful episodes in the entire history of the Metropolitan Police Service.” Over the three decades since Daniel was killed, five failed police investigations an ...
  continue reading
 
Loading …
show series
 
Despite governments' best efforts, spyware is still running rampant on the threat landscape. These types of tracking malware are used to target high-profile individuals like politicians, activists, journalists and more — and even sometimes for jealous exes to track their former partners. Asheer Malhotra, who recently dissected the Predator spyware,…
  continue reading
 
Last week, on May 25, the digital-rights group Access Now broke a story revealing that Pegasus spyware was used to hack civil-society figures in Armenia. Notably, these infiltrations took place against the backdrop of the conflict with Azerbaijan over Nagorno-Karabakh — making this investigation’s findings the first documented evidence of Pegasus s…
  continue reading
 
From Sourced Network Productions in New York City, “It's 5:05” on Wednesday, May 31st, 2023. This is your host, Mark Miller, sitting in for Pokie Huang. Stories in today's episode come from Edwin Kwan in Sydney, Australia, Katy Craig in San Diego, California, Marcel Brown in St. Louis, Missouri and me, this week calling in from Ann Arbor Michigan. …
  continue reading
 
Contact your host charles_martin@appleinsider.com Links from the show ChatGPT might quit the EU rather than comply with regulations Biden administration: Apple & Broadcom should quit stalling and pay Caltech $1.1 billion in damages Apple updates Developer app with support for WWDC 23 sessions, labs, and more Pegasus iPhone spyware is now a tool of …
  continue reading
 
AhRat exfiltrates files and records audio on Android devices. The BlackCat ransomware group uses a signed kernel driver to evade detection. GUI-Vil in the cloud. Unwitting money mules. Ben Yelin unpacks the Supreme Court’s section 230 rulings. Our guest is Mike DeNapoli from Cymulate with insights on cybersecurity effectiveness. And a trio of comme…
  continue reading
 
Johanna speaks with Brett Solomon, co-founder and Executive Director of Access Now, about the state of digital rights in 2023. The pair discuss critical issues including internet shutdowns, the growth of the surveillance industry, and Australia’s role in defending human rights in the digital era. The conversation took place in the lead-up to the 12…
  continue reading
 
Hey, it's 5:05 on Monday, June 5th, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from Edwin Kwon in Sydney, Australia, Julie Chatman in Washington, DC, Katy Craig in San Diego, California, Marcel Brown in St. Louis, Missouri. Let's get to it. AI Regulation by the Australian…
  continue reading
 
Anonymous Sudan responds to remarks from the US Secretary of State by targeting Lyft and American hospitals. NSA releases an advisory on North Korean spearphishing campaigns. The US government’s Moonlighter satellite will test cybersecurity in orbit. "Operation Triangulation" offers an occasion for Russia to move closer to IT independence. The SEC …
  continue reading
 
The biggest weakness in the international banking system is human error. These hackers pulled off the largest bank robbery in history with perfect timing and a few keystrokes. Get the full episode here: https://www.youtube.com/watch?v=ttohYNSCkik ... https://www.youtube.com/watch?v=odliDuLX3tIBy Jack Rhysider
  continue reading
 
This episode contains descriptions of violence. In the two years since the United States pulled out of Afghanistan, the Taliban has shut women and girls out of public life. Christina Goldbaum, a correspondent in the Kabul bureau for The New York Times, traveled across Afghanistan to talk to women about how they’re managing the changes. What she fou…
  continue reading
 
It's been about six months since the Attorney General issued new guidelines on compulsory process to members of the press in criminal and national security investigations, and two officials of the Reporters Committee for Freedom of the Press—Bruce Brown and Gabe Rottman—wrote a detailed analysis of the document in two parts for Lawfare. Rottman joi…
  continue reading
 
Churches have been holding baptisms, weddings and funerals for the people of Britain for well over 1,500 years. But in recent decades the numbers of those choosing to hold these pivotal life moments inside a church building have been plummeting sharply. In this week's episode we discuss whether Christians should be concerned about this trend and wh…
  continue reading
 
This week, Alan, Quinta, and Scott were joined by their Brookings and Lawfare colleague Molly Reynolds to talk all things Congress in the week’s national security news, including: Shattering the Must-Pass Ceiling.” Earlier this week, President Joe Biden and Speaker Kevin McCarthy announced a deal on raising the debt ceiling, and thereby avoiding a …
  continue reading
 
Galit Lubetzky Sharon, Co-Founder and CTO of Wing Security sits down to share her story and how years in the business lead her to be where she is now. Galit shares her insights from her experiences co-founding her company and bringing it out of stealth mode in early 2022, including why she saw the need for Wing Security and what lessons she learned…
  continue reading
 
This weekend, we’re bringing dispatches from Times critics and writers on great music, TV, movies, recipes and more. They’re all part of a new series called “NYT Shorts,” available only on NYT Audio, our new iOS audio app. It’s home to podcasts, narrated articles from our newsroom and other publishers, and exclusive new shows. Find out more at nyti…
  continue reading
 
From October 1, 2016: At this week's Hoover Book Soiree, Rosa Brooks joined Benjamin Wittes to talk about her new book, “How Everything Became War and the Military Became Everything: Tales from the Pentagon.” The book covers an extraordinary range of territory, from Brooks' personal experiences working as a civilian advisor at the Pentagon, to the …
  continue reading
 
Contact your host charles_martin@appleinsider.com Links from the show Apple is accelerating hiring efforts for generative AI engineers Apple plans to open or remodel around 50 stores across the globe by 2027 Apple unveils opening date for new retail store at London's Battersea Power Station Apple petitioned India for slacker labor laws, and unions …
  continue reading
 
Brigid O Gorman from Symantec joins Dave to discuss their research, “Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors." Researchers discovered in 2020 that Lancefly, an APT group, is using a custom-written backdoor in attacks targeting government, aviation, educations, and telecoms organizations in South an…
  continue reading
 
A scary story about a man who finds himself back in his deceased father's home, remembering the many sleepless nights spent there and uncovering several well-kept secrets from his family. Find me on Instagram @edwincov or email me at edwin@scarypod.com Get ad-free listening and bonus content by trying out Scary Plus or our Apple Subscription channe…
  continue reading
 
Hey. It's 5:05 on Friday, June 2nd, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from Edwin Kwon in Sydney, Australia, Mark Miller in Ann Arbor, Michigan, Katy Craig in San Diego, California, Marcel Brown in St. Louis, Missouri. Let's get to it. Active Exploitation of MOVEi…
  continue reading
 
MOVEit Transfer software sees exploitation. A website skimmer has been employed against targets in the Americas and Europe. A look into XeGroup's recent criminal activity. Apple denies the FSB’s allegations of collusion with NSA. Kaspersky investigates compromised devices. Johannes Ullrich from SANS describes phony YouTube "live streams". Our guest…
  continue reading
 
In recent years, well-paid and college-educated Americans have shed major cities like New York, San Francisco and Washington for places like Philadelphia or Birmingham, Ala. Emily Badger, who writes about cities and urban policy for The Upshot at The New York Times, explains what is driving the change, and what it means for the future of the Americ…
  continue reading
 
It is often said that “Russia is a country with an unpredictable past.” Such distortions of history can lead to trouble, as the world witnessed last year when Vladimir Putin justified his invasion of Ukraine as an attempt to “denazify” the neighboring country—one with a Jewish president who lost relatives in the Holocaust. As Megan Buskey writes in…
  continue reading
 
Contact your host charles_martin@appleinsider.com Links from the show iTunes on Windows security flaw allows unauthorized access & data manipulation Zero-click iOS malware attack through iMessage is actively infecting iPhones Apple says iOS 16 is on 81% of all iPhones Apple India's record-breaking sales revealed thanks to unprecedented leak 'No Man…
  continue reading
 
Hey, it's 5:05 on Thursday, June 1st, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from Edwin Kwon in Sydney, Australia, Katy Craig in San Diego, California, Ian Garrett in Arlington, Virginia, Kadi Grigg in Alexandria, Virginia, Marcel Brown in St. Louis, Missouri. Let's g…
  continue reading
 
A backdoor-like issue has been found in Gigabyte firmware. A credential harvesting campaign impersonates Adobe. The Dark Pink gang is active in southeastern Asia. Mitiga discovers a “significant forensic discrepancy” in Google Drive. "Spyboy" is for sale in the C2C market. A look at Cuba ransomware. Ukrainian hacktivists target the Skolkovo Foundat…
  continue reading
 
Alicia Wanless is one of the pioneers of the idea of information ecology, the notion that we should think about information and disinformation as part of a complex ecosystem, the management of which she analogizes to environmental policy. Wanless has been complaining for several years that the war on “disinformation” skates over important question:…
  continue reading
 
How to say "GIF". A Blackmailer-in-the-Middle attack. Knitting your own crypto. KeePass master password shenanigans. Binge listening.https://nakedsecurity.sophos.com/ransomware-tales-the-mitm-attackhttps://nakedsecurity.sophos.com/serious-security-verification-is-vitalhttps://nakedsecurity.sophos.com/serious-security-that-keepass-master-password-cr…
  continue reading
 
With stunning speed, the status of trans youth has become the rallying cry of the Republican Party, from state legislatures to presidential campaigns. Adam Nagourney, who covers West Coast cultural affairs for The New York Times, explains how that came to be, and why it’s proving such a potent issue. Guest: Adam Nagourney, a West Coast cultural aff…
  continue reading
 
The war in Ukraine is approaching a pivotal moment. Russia remains in control of the hotly contested city of Bakhmut. But the ruthlessly effective mercenary forces of the Wagner Group—the same group whose leader, Yevgeny Prighozin, has openly bickered with the regular Russian military and reportedly offered to trade Russian troop positions to Ukrai…
  continue reading
 
Contact your host charles_martin@appleinsider.com Links from the show Several new Macs will launch at WWDC, says Gurman Popular music game 'Beat Saber' may be heading to Apple's VR headset App Store developers surpass $1 trillion milestone from sales in 2022 Apple goes all in on live video shopping & iPhone sales for China's big '618' festival Appl…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2023 | Sitemap | Privacy Policy | Terms of Service |