The Cyber Nerds - Beyond The Sofa's Podcast Reviews. Discussions. Arguments. Beyond the Sofa is the official podcast from the best YouTube reactors on the planet. Tune in to weekly episodes.
…
continue reading
Hacker Public Radio is an podcast that releases shows every weekday Monday through Friday. Our shows are produced by the community (you) and can be on any topic that are of interest to hackers and hobbyists.
…
continue reading
A movie podcast dedicated to breathing new life into dead formats – interactive movies, made-for-TV stuff, shot-on-video films, that sort of thing. If it’s obscure, bizarre, or almost unwatchable, we want to talk about it.
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
This weekly podcast features lively debates over nerd culture, discussions over the latest video games, and unfairly comparing everything to the 2001-2010 golden-age of gaming.
…
continue reading
We are a weekly Comic Book and Pop Culture podcast that discusses the current events in Entertainment, Comic Books, Movies, TV Shows and Pop Culture in general. We also have special episodes that go in to depth on your favorite and some little known Marvel and DC Comics Characters, We review TV Shows like Agents of Shield, The Flash, Westworld and more and we also review movies.
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Conversations about conflict on an angry planet. Created, produced, and hosted by Matthew Gault and Jason Fields 781951 Support this show http://supporter.acast.com/warcollege. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Shoot us a Message and It might feature on our next Podcast Episode! Andor S2. Ep3 - Harvest Time is running out for everyone. Support the show Watch our exclusive content and daily show reactions here TCN Patreon Can't get enough of us? Subscribe to our YouTube Channels: 🎥 TCN Main Channel 🎮 TCN Gaming Channel 👹TCN Anime Channel…
…
continue reading

1
Risky Bulletin: White House rejects nominee for NSA & CyberCom leader
8:09
8:09
Play later
Play later
Lists
Like
Liked
8:09The White House rejects the Pentagon’s nominee for NSA & CyberCom leader, the FCC probes the US Cyber Trust Mark program, a cyberattack disrupts Russia’s animal products industry, and hackers leak data about everyone in Paraguay. Show notes
…
continue reading
This show has been flagged as Clean by the host. Out of nowhere, my Firefox browser on my Mac mini started automatically adding every page I visited to my bookmarks. At first, I thought it was a bug after recent update —maybe a misconfigured setting or similar. But when I searched for a fix, Google suggested something alarming: Scan for malware. An…
…
continue reading
In this Risky Bulletin sponsor interview Fletcher Heisler, CEO of Authentik, talks to Tom Uren about the inflection points that make organisations consider rationalising their Identity Providers (IdPs). The pair also discuss sovereign tech stacks and how to earn the trust of customers. Show notes
…
continue reading

1
Risky Bulletin: Russian hackers abuse app-specific passwords to bypass MFA
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46Russian hackers abuse app-specific passwords to bypass multi-factor, the tenth Salt Typhoon victim is identified, Predatory Sparrow destroys $90 million from an Iranian crypto-exchange, and Argentina arrests a Russian disinfo gang. Show notes
…
continue reading
This show has been flagged as Explicit by the host. This is about developing Visual Basic classes for a web application. The classes access an SQL Server database via Stored Procedures. Tests.vb Private Sub ResourceTypeTests() ResourceTypeAddTest() ResourceTypeGetTest() End Sub Private Sub ResourceTypeAddTest() Dim fake As New Fake Console.WriteLin…
…
continue reading
Shoot us a Message and It might feature on our next Podcast Episode! The Cyber Nerds reaction and discussion on James Gunn's new Superman movie. Superman embarks on a journey to reconcile his Kryptonian heritage with his human upbringing as Clark Kent. Support the show Watch our exclusive content and daily show reactions here TCN Patreon Can't get …
…
continue reading

1
Srsly Risky Biz: Data brokers are a killer's best friend
22:28
22:28
Play later
Play later
Lists
Like
Liked
22:28Tom Uren and Patrick Gray talk about a Minnesota man who used people-search services to locate, stalk and eventually murder political targets. They also discuss purported hacktivist group Predatory Sparrow weighing in on the Iran-Israel conflict. It has attacked Iran’s financial system including a bank associated with the Iranian Revolutionary Guar…
…
continue reading
This show has been flagged as Explicit by the host. More Command line fun: downloading a podcast In the show hpr4398 :: Command line fun: downloading a podcast Kevie walked us through a command to download a podcast. He used some techniques here that I hadn't used before, and it's always great to see how other people approach the problem. Let's hav…
…
continue reading

1
Risky Bulletin: Israel-linked hackers claim Iran bank disruption
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03An Israeli-linked hacktivist group claims attack on Iranian bank, Chrome gets a new prompt to prevent local network attacks, a Century-old German napkin company goes under following ransomware attack, and Europol takes down the Archetyp dark web market. Show notes
…
continue reading
This show has been flagged as Clean by the host. Get your own copy of the HPR database reset_hpr.sh systemctl start mariadb curl https://hackerpublicradio.org/hpr.sql > hpr.sql mariadb -e 'drop database hpr_hpr' mariadb -e 'create database hpr_hpr' mariadb hpr_hpr < hpr.sql mariadb -e 'select count(*) from eps' hpr_hpr mariadb -e 'select * from com…
…
continue reading

1
Silicon Valley Wants ‘More Everything Forever’
55:10
55:10
Play later
Play later
Lists
Like
Liked
55:10Listen to this episode commercial free at https://angryplanetpod.com The futures of the past have curdled into the nightmares of the present. The richest and most powerful people the world has ever known want to colonize mars, live forever, and digitize human consciousness. To make these technological miracles come to pass, they say, will require p…
…
continue reading
This show has been flagged as Clean by the host. 1 intro hpr 4346 swift 110 2 prior tablet samsung tablet lineageos 3 my use case reading pdfs/epubs using emacs forth developement on microcontrollers, serial port access was a challenge 4 my not use case video media consumption audio consumption 5 pinetab2 tablet based on rockchip rk3566 4 gig and 8…
…
continue reading

1
Between Two Nerds: Why modern influence operations suck
30:21
30:21
Play later
Play later
Lists
Like
Liked
30:21In this edition of Between Two Nerds Tom Uren and The Grugq take a look at a new AI-powered covert influence campaign and compare it to World War 2 efforts. This episode is also available on Youtube. Show notes
…
continue reading

1
Feeders (1996) with TYTD Reviews and Trivial Theater
1:36:52
1:36:52
Play later
Play later
Lists
Like
Liked
1:36:52Chris is joined by Dan from TYTD Reviews and Triv from Trivial Theater to explore the 1996 SOV film Feeders directed by the infamous Polonia brothers and Jon McBride. They discuss the unique regional aspects, filmmaking techniques, and distinct features of this low-budget sci-fi horror. The conversation covers various highlights, including practica…
…
continue reading

1
Risky Bulletin: Washington Post email accounts hacked
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48Email accounts compromised at the Washington Post, shady email provider Cock.li gets hacked, hackers steal data from a French university, and the EU invests €145 million in hospital cybersecurity. Show notes
…
continue reading
This show has been flagged as Explicit by the host. hajime This installation script installs an Arch Linux system on an x64 architecture. The installation can be done with or without a network connection (internet). oxo/hajime - Codeberg.org hajime/make-recov at main - oxo/hajime - Codeberg.org isolatest/isolatest at main - oxo/isolatest - Codeberg…
…
continue reading
In this Risky Bulletin sponsor interview Michael Leland, Field CTO of Island, talks about how Island manages risks from extensions, phishing and infostealers. Even when credentials are stolen, it is still not game over and there are still ways to prevent data loss and breaches. Show notes
…
continue reading

1
Risky Bulletin: Predator spyware alive despite US sanctions
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47Intellexa is alive and well despite US sanctions, Paragon spyware used a zero-click iMessage exploit, South Korea’s largest online bookstore gets ransomwared, and law enforcement takes down several cybercrime operations. Show notes
…
continue reading
This show has been flagged as Clean by the host. Isaac Asimov is best known for two series, the Foundation series and the Robot series, and he eventually tied them together. But he also wrote some stand-alone novels that are quite good, and I want to discuss them here. They are The End Of Eternity, The Gods Themselves, and Nemesis. Links: https://e…
…
continue reading