Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
Tresorit's own produced podcast, bringing you biweekly insights on business, security and technology. If you have any questions or feedback, please write to us at [email protected].
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Become a Paid Subscriber: https://podcasters.spotify.com/pod/show/siliconcurtain/subscribe A podcast about propaganda, digital disinformation, politics, corruption, hybrid warfare, weaponised conspiracy theories, social echo chambers and digital dystopias. 1984, Authoritarian, Autocracy, Autocrat, Big Brother, Brainwashing, Cold war, Cold war propaganda, Communism, Conflict, Conspiracy theories, Control, Cults, Cyber warfare, Deception, Dictator, Dictatorship, Digital dystopia, Digital media ...
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The MERICS China Podcast, brought to you by the Mercator Institute for China Studies, a show that analyses current affairs in China and the latest developments in EU-China relations.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
Journalists Carole Cadwalladr and Peter Jukes – with the help of Conservative party whistleblower Sergei Cristo – expose an alleged secret spy ring operating at the very heart of the British political system. This is the untold story of the most audacious Russian influence operation in British history. It involves honey traps, Russian agents and information warfare. Russian wealth and glamour collide with a wild west of new digital landscapes. And as Sergei tries and fails to raise the alarm ...
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
In-depth conversations on technology and business with senior leaders from top global companies. Hosted by industry analyst Michael Krigsman.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
We Cover the Cyberspace.
…
continue reading
Star Link emphasizes in providing corporate organizations with all types of biometric attendance system & access control system and all most all types of softwares to speed up HRs, Admin & Top Most Management with smooth an effective workflow.
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Senior Intelligence Analysts Chris Morgan and Kim Bromley bring together over 30 years of experience in threat intelligence across government, military, and telecommunications. Along with their guests, they provide practical perspectives on t ...
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
The Digital Banking Podcast is powered by Tyfone. Tyfone is a dramastically better digital banking provider. Our appeal is unique, we collaborate closely with our customers and the banking ecosystem in an open approach coupled with a powerful user experience that helps “get things done”! On our podcast you will hear how digital banking plays a leading role for community minded financial institutions from the unique perspectives of our industry expert guests.
…
continue reading
Interviews and fun with professionals, hackers, and everything in between.
…
continue reading
Digital certificate industry veterans Tim Callan and Jason Soroko explore the issues surrounding digital identity, PKI, and cryptographic connections in today's dynamic and evolving computing world. Best practices in digital certificates are continually under pressure from technology trends, new laws and regulations, cryptographic advances, and the evolution of our computing architectures to be more virtual, agile, ubiquitous, and cloud-based. Jason and Tim (and the occasional guest subject ...
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
This is the show for IT leaders looking to move fast, optimize costs, and protect against the latest security threats in their IT environments. In each episode, discussions tackle one aspect of IT, from cloud computing and digital workplace to modern infrastructure and cybersecurity. If you're looking to stay ahead in the game, enhance your organizational agility, and secure your digital assets, you've come to the right place.
…
continue reading
Darren Pulsipher, Chief Solution Architect for Public Sector at Intel, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution. People Workers are at the heart of many of today’s biggest digital transformation projects. Learn how to transform ...
…
continue reading

1
Hackers Breach Morocco's Social Security Database in an Unprecedented Cyberattack...Ep.21
10:12
10:12
Play later
Play later
Lists
Like
Liked
10:12- Cybersecurity in South Africa: How The Cell C and SABS Attacks Could Have Been Prevented. - Hackers Breach Morocco’s Social Security Database in an Unprecedented Cyberattack. - Kaspersky Flags Surge in Cyber Threats Across Africa in The GITEX Africa April 2025 Conference. - Google Says "Fibre Optic Should Be Considered 'Critical Infrastructure' i…
…
continue reading
One of the essential skill sets for a DFIR analyst is the ability to understand the impact of vulnerabilities quickly. In many IR scenarios, you may find a newly discovered vulnerability or receive a scan that flags multiple potential weaknesses. To stay efficient, you must...
…
continue reading

1
🎙️ Future Secured Episode 34: The Fifth Domain is Cyber Warfare
44:13
44:13
Play later
Play later
Lists
Like
Liked
44:13In this hard hitting episode of Future Secured, Jason Murrell and Tom Finnigan sit down with Matt Wilcox, Founder and CEO of FIFTH DOMAIN, to unpack what it really takes to train and equip the cyber warriors of today. With a unique background, Matt brings a rare perspective to cyber training, focusing on human performance, immersive learning, and t…
…
continue reading

1
Smart Payroll Solutions for Modern Businesses
3:07
3:07
Play later
Play later
Lists
Like
Liked
3:07In this episode, Star Link Communication explores how payroll management has evolved from traditional, error-prone manual systems to fully automated, web-based solutions. The focus is on the transformative role of Star Link’s Payroll Management Software, which simplifies salary processing while ensuring full compliance with Indian tax regulations a…
…
continue reading

1
E044 - Digital Hostage Crisis (Brian goes SOLO for an episode)
28:53
28:53
Play later
Play later
Lists
Like
Liked
28:53In this episode of Socializing Security, Brian goes SOLO for an episode and breaks down the complex world of cybersecurity, exploring how cyber warfare, espionage, and ransomware are reshaping the digital landscape. From real-world impacts of data breaches to the silent threat of cyber spies, we uncover why your personal security matters more than …
…
continue reading

1
Digital Car Theft: How Hackers Steal in Seconds – PlaxidityX Ep 20
9:56
9:56
Play later
Play later
Lists
Like
Liked
9:56In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace. From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding ne…
…
continue reading

1
Deepfake Dilemma: Why Facial Recognition is Failing - Ep 147
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12In this eye-opening episode of Reimagining Cyber, host Tyler Moffitt is joined by Tom Tovar, co-creator of cybersecurity company Apto, to unpack one of the fastest-growing threats in mobile security—deepfakes and biometric bypass attacks. Tom explains why facial recognition, once considered a reliable security measure, was never designed to withsta…
…
continue reading
In this conversation, Matthew Chavira, CEO of Profits of AI,discusses his journey in the AI industry, particularly focusing on the evolution of humanoid robots like Sophia. He explores the rapid advancements in humanoid robotics, the integration of AI capabilities, and the public's perception of these technologies. Chavira emphasizes the importance…
…
continue reading
Hackers are using AI to create fake job candidates that look and sound real on Zoom. Try this pro trick to spot them.By Kim Komando
…
continue reading

1
688. Sir Richard Shirreff - Russia is on its Knees - We Should not Let it Get Back up to Rearm & Regroup.
44:31
44:31
Play later
Play later
Lists
Like
Liked
44:31Vladimir Putin’s obsession with dominating Ukraine stems from a mix of geopolitical paranoia, historical revisionism, and authoritarian self-preservation. He views Ukraine’s westward shift in political aspirations and values—especially EU integration—as a direct threat to Russia’s sphere of influence and his regime’s legitimacy and indeed survivabi…
…
continue reading
This week, I’m talking about nested groups in Windows Active Directory and the security risks they pose. Active Directory allows administrators to attach one group to another—often called nesting. While nesting can simplify account administration and permission management, it can also create real opportunities for attackers if...…
…
continue reading
Some moments are meant for respect, not your camera roll.By Kim Komando
…
continue reading

1
Lawfare Daily: The President, Congress, and the Power of the Purse
48:25
48:25
Play later
Play later
Lists
Like
Liked
48:25In today’s episode, Molly Reynolds, Senior Fellow at Brookings and Senior Editor at Lawfare, sits down with Matt Lawrence, Associate Professor of Law at Emory; Eloise Pasachoff, Professor of Law at Georgetown; and Zach Price, Professor of Law at UC Law San Francisco to discuss a new paper on “Appropriations Presidentialism,” or how the executive br…
…
continue reading
In this episode of Socializing Security, the hosts dive into the question of whether the cloud is safe. They discuss the evolution of cloud security, comparing it to on-premises solutions, and emphasize the importance of understanding the shared responsibility model between cloud providers and users. The conversation also covers different types of …
…
continue reading

1
OWASP security misconfiguration (noun) [Word Notes]
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration Audio reference link: “What Is the Elvish Word for Friend?” Quora, 2021.…
…
continue reading
In late 2023, Nick Lawler got a call from someone claiming to be an FBI agent. The man said that the utility Nick ran in Littleton, Massachusetts, was the target of an elaborate, international hacking operation. It set off an unlikely series of events that involved a small community, Chinese state hackers and the quiet threat hiding in our most bas…
…
continue reading

1
How Responsible AI is Shaping the Future of Banking and Finance - with Shub Agarwal of U.S. Bank and USC
21:28
21:28
Play later
Play later
Lists
Like
Liked
21:28On today’s episode, we’re joined by Shub Agarwal, author of Successful AI Product Creation: A 9-Step Framework available from Wiley and a professor of the University of Southern California teaching AI and Generative AI product management to graduate students. He is also Senior Vice President of Product Management for AI and Generative AI at U.S. Ba…
…
continue reading

1
S34 Ep1: Threat Horizon 2027: Grasping for Control
25:12
25:12
Play later
Play later
Lists
Like
Liked
25:12Today, Steve talks about ISF's flagship foresight report "Threat Horizon 2027: Grasping for Control." In a world defined by disruption and acceleration, this report offers not just a forecast of cyber threats, but a blueprint for resilience, and Steve walks listeners through the key themes. Key Takeaways: 1 Flexibility will be key in an increasingl…
…
continue reading

1
Artifacts of Deception (Deceptive Minds - issue #2)
12:09
12:09
Play later
Play later
Lists
Like
Liked
12:09Hey friends! Here's issue 2 of Deceptive Minds: a newsletter about how we are fooled, how we fool ourselves, and what we can do about it. 🔥 Since starting this newsletter last week, we're already closing in on 3,000 subscribers to the print edition! 🔥 Huge thanks to everyone who's jumped in early! This week, I'm diving into what I call the “artifac…
…
continue reading

1
Deceptive Minds (the audio experience): Issue #1
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17 Hey listeners, Perry Carpenter here. Yeah, it's been a while since I've posted this feed, but I've got something exciting that I think you'll be interested in. It's the audio version of a newsletter that I recently started. The newsletter is called Deceptive Minds, and it's all about how we are fooled, how we fool ourselves, and what we can do abo…
…
continue reading

1
Corte de Energia en España, Europa! 60% of the supply of energy vanished in 5 seconds!
2:25:48
2:25:48
Play later
Play later
Lists
Like
Liked
2:25:48}Key Points A massive power outage hit Spain and Portugal on April 28, 2025, disrupting critical infrastructure, with the cause still under investigation. It seems likely that a grid failure caused the outage, though a cyberattack is being investigated but not confirmed. The Spanish government has been transparent, stating no conclusive cause yet, …
…
continue reading

1
Silicon Bites #135 - Your Armies have Become Redundant Because of Rapidly Evolving Drone Warfare
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11Edition No135 | 28-04-2025 - After transitioning to become his excellency, Ukraine’s ambassador to the UK, General Valerii Zaluzhnyi kept a relatively low profile. Now he’s attending more civic events that have connections to the Ukrainian community, and has given keynote addresses at several significant events, including Chatham House and Rusi. Hi…
…
continue reading
Are you inbox zero? If not, here’s a simple way to get rid of all those junky emails.By Kim Komando
…
continue reading

1
Inside the DARPA AI Cyber Challenge: Securing Tomorrow’s Critical Infrastructure Through AI and Healthy Competition | An RSAC Conference 2025 Conversation with Andrew Carney | On Location Coverage with ...
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35During RSAC Conference 2025, Andrew Carney, Program Manager at DARPA, and (remotely via video) Dr. Kathleen Fisher, Professor at Tufts University and Program Manager for the AI Cyber Challenge (AIxCC), guide attendees through an immersive experience called Northbridge—a fictional city designed to showcase the critical role of AI in securing infrast…
…
continue reading

1
687. Yuliya Ziskina & Timothy Ash - Seizing Russian Assets Must be Treated as Matter of National Security
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26Yuliya Ziskina is a Policy and advocacy attorney specializing in information policy and public international law from Ukraine. She is based in the New York City Metropolitan Area.----------Timothy Ash, who has been professional economist for more than 30 years, with two thirds of that in the banking industry. Timothy’s specialism is emerging Europe…
…
continue reading

1
Ep. 11 - Tech Sessions - Google Cloud Next '25 Recap: Cloud and AI Innovation
45:24
45:24
Play later
Play later
Lists
Like
Liked
45:24Opening Summary In this episode, Jeff Dickman (Senior Director of Cloud at e360) and Roy Douber (Principal Architect, Observability, e360) dive deep into the major announcements from Google Cloud Next ‘25. From Unified Security to cutting-edge AI agent ecosystems, this episode is packed with insight into how Google is pushing the envelope on cloud,…
…
continue reading

1
Alberto shares his personal story of being wrongly accused and imprisoned
2:48:57
2:48:57
Play later
Play later
Lists
Like
Liked
2:48:57Alberto shares his personal story of being wrongly accused and imprisoned due to security vulnerabilities in a medical records system. He recounts how he was initially suspected of hacking into the system, but he believes that the evidence against him was incomplete or misleading. Alberto's experience led him to write a book about it, which was pub…
…
continue reading
The Los Angeles Times uncovered a covert electioneering campaign involving over 500 social media creators. Here's the scoop.By Kim Komando
…
continue reading

1
Lawfare Daily: The Trials of the Trump Administration, April 25
1:34:17
1:34:17
Play later
Play later
Lists
Like
Liked
1:34:17In a live conversation on April 25, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Anna Bower, Scott Anderson, and Roger Parloff, Lawfare Legal Fellow James Pearce, and Lawfare Contributor Preston Marquis to discuss the status of the civil litigation against President Trump’s executive actions, including the arrest of …
…
continue reading

1
The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in the cybersecurity industry, and the recent launch of the CVE Foundation. We also discuss the Trump Administration’s executive order that revoked the security clearan…
…
continue reading

1
The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in the cybersecurity industry, and the recent launch of the CVE Foundation. We also discuss the Trump Administration's executive order that revoked the security clearan…
…
continue reading
We define Chrome versus Chromium, explaining what each is and the difference between the two.By Tim Callan and Jason Soroko
…
continue reading
Turns out, tons of people still don’t know how to do it. If that’s you, here’s the quick fix for iPhone and Android.By Kim Komando
…
continue reading

1
682. Vlad Mykhnenko - The Delusion of Buried Riches in Ukraine - The Challenges of Trump's Minerals Deal.
48:10
48:10
Play later
Play later
Lists
Like
Liked
48:10Vlad Mykhnenko is Professor of Geography and Political Economy at the University of Oxford and a Fellow of St. Peter's College, Oxford. He is an economic geographer, specialising in geographical political economy. His academic focus is on challenging the conventional wisdom of urban and regional development within the transition economies of easter…
…
continue reading
Motorola unveiled a completely new Razr flip phone. But this time, the phone comes with Perplexity A.I. baked in.By Kim Komando
…
continue reading

1
Lawfare Archive: The Legislative Dog That Hasn’t Barked
48:01
48:01
Play later
Play later
Lists
Like
Liked
48:01From April 11, 2022: The period after Watergate and President Nixon's resignation saw an unprecedented barrage of congressional efforts at reforming the executive branch. The period after Donald Trump's departure from office has seen no comparable spree of legislative action—at least not yet. In a recent Lawfare article, Quinta Jurecic and Andrew K…
…
continue reading
Ever post a pic online? There's a good chance it was scraped and added to an AI dataset. Check this site to find out.By Kim Komando
…
continue reading

1
684. Yuri Felshtinsky - Trump's Peace Deal was Authored in Moscow, and Designed to be Punitive on Ukraine
1:05:04
1:05:04
Play later
Play later
Lists
Like
Liked
1:05:04Dr Yuri Felshtinsky is a prominent author, historian, and journalist, and expert on Russia and the former Soviet Union. He has appeared in hundreds of print, TV, and radio interviews worldwide, and is widely known as co-author of the book “Blowing Up Russia” with Alexander Litvinenko, a former Lieutenant Colonel in the FSB who was poisoned with rad…
…
continue reading
Two teens started flipping discarded items from landfills. Now they run a seven-figure resale business.By Kim Komando
…
continue reading

1
Lawfare Archive: The Spymasters with Chris Whipple
52:02
52:02
Play later
Play later
Lists
Like
Liked
52:02From September 16, 2020: What is the proper relationship between the CIA director and the president? How should directors handle arguably illegal orders? How important is the director's role as the nation's honest broker of information during times of crisis? To get at these questions, David Priess sat down with Chris Whipple, a documentary filmmak…
…
continue reading

1
Man CONTINUES sending money to his military girlfriend!
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26Man CONTINUES sending money to his military girlfriend! [1]
…
continue reading
Looking for a way to get in touch with someone online? Try these pro tips.By Kim Komando
…
continue reading

1
Silicon Bites #134 - One of Putin's Military Generals Erased in Bomb Blast on the Streets of Moscow.
5:39
5:39
Play later
Play later
Lists
Like
Liked
5:39Edition No134 | 25-04-2025 - Lieutenant General Yaroslav Moskalik has been killed in a car bomb attack near Moscow. The most likely suspect for this highly targeted assassination is Ukraine. The elimination of Lieutenant General Yaroslav Moskalik follows that of another senior Russian military figure, Lieutenant General Igor Kirillov, in December. …
…
continue reading

1
683. Georgijs Ivanovs - Coalition of the Useless and Deluded is Falling Apart Even Before it's Deployed
1:01:40
1:01:40
Play later
Play later
Lists
Like
Liked
1:01:40Georgijs Ivanovs started the Ukraine Matters channel in 2007, and it has garners 11.5 m views. He started the channel to explain the situation surrounding the war in Ukraine in simple terms. Like myself, he is not Ukrainian, nor is he a military expert. But he has been to Ukraine many times and seen it almost fully (except for Odesa region). He has…
…
continue reading