Human Hackers public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Artwork

1
Human Hackers

Human Hackers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A place where Human and Online collide... The Human Hackers podcast is all about you. It's about exploring the trials and tribulations of you as an entrepreneur, seeking success in a world of rapid change and competing interests. It is also raw and real. Phil and Ian relentlessly pursue solutions and ideas to overcome the most common Human and Online challenges. Letting it all go, they unleash their own vulnerabilities and challenges. As the Human Hackers podcast unfolds it's easy to get los ...
  continue reading
 
Artwork
 
Your one-stop shop for all Changelog podcasts. Weekly shows about software development, developer culture, open source, building startups, artificial intelligence, shipping code to production, and the people involved. Yes, we focus on the people. Everything else is an implementation detail.
  continue reading
 
Artwork

1
Hacker News TLDR

Tuesday Labs

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Catch up on all the best stories and discussion on Hacker New each week. Hosted by Colin (a YC-backed founder and typescript fanatic) and Kenny (a human-computer interaction whiz who just wants software to be fast).
  continue reading
 
Artwork

1
The FAIK Files

Perry Carpenter | N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through news, research, and real-world examples. Join us for a thought-provoking journey into a world where anything can be faked, truth is increasingly elusive, and human nature meets artificial intelligence head-on.
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Download This Show is your weekly guide to the world of media, culture, and technology. From social media to gadgets, streaming services to privacy issues. Each week Rae Johnston and guests take a fun, deep dive into how technology is reshaping our lives.
  continue reading
 
Artwork

1
Truthiverse

With Brendan Murphy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Freedom Hacker, creator of The Truthiversity, and acclaimed author of 'The Grand Illusion' books as he cuts through the B.S. to get to the truth - whatever it may be. Brendan and his guests uncover the mysteries of consciousness, geopolitics, health, cosmology, medicine, freedom, personal development, exopolitics, the paranormal, and more. No dogmas. No holds barred. Nothing off limits. You'll need an open mind and your grown-up pants. Find out more about Brendan: https://brendandmurphy ...
  continue reading
 
Artwork

1
Personality Hacker Podcast

Joel Mark Witt & Antonia Dodge

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Make better decisions based on how your mind works. Personality Hacker teaches you the coding language of your mind and how to use it to create great relationships - a fulfilling career and happiness. Are you born with your personality, or does it develop over time? What is intuition? What's the fastest way to use your natural gifts to improve overall happiness? Join Joel Mark Witt and Antonia Dodge as they discuss small changes in your personality and relationships that have big impact.
  continue reading
 
Artwork

1
Culture Hackers

Robbe Richman and a cast of hackers, troublemakers, movers and shakers, Robbe Richman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A show all about culture hacking - at companies, in business and the world. The first episodes are the free audio book of Robert Richman's "Culture Blueprint."
  continue reading
 
Artwork
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Artwork
 
Brenda Neckvatal is a best-selling author, HR Strategist, and culture hacker. Her mission is to pour into her listeners giving them the tan outrageous success. She brings in incredible guests and talks about winning, leadership, influence, some current HR topics, news, and trends impacting businesses of all sizes.
  continue reading
 
Want to know more about the human side of cybersecurity? This is the show for you. Each week, Tessian's Tim Sadler meets with security experts and business leaders to discuss everything from security cultures, hackers, social engineering and insider threats.
  continue reading
 
In the shadows of the digital world, where anonymity is power and information is currency, battle lines are drawn not with bullets but with code. This show takes listeners deep into the heart of cyberspace’s most high-stakes confrontations — where rogue programmers exploit vulnerabilities, corporations scramble to secure their data empires, and government agencies wage invisible wars across invisible lines. It’s a realm shaped by encryption, espionage, whistleblowers, and wild ambition. From ...
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork

1
Cyber Humanity

Immersive Labs

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Learn all the hacks to upgrade your life, money and travel – all while spending less and saving more. Host Chris Hutchins is a life hacker who has saved millions by breaking down every aspect of life, looking to maximize happiness at the lowest cost. Chris and guests like Tim Ferriss, Tony Hawk, Codie Sanchez and Gary Vaynerchuk will help you learn the strategies and tactics they used to shape their success.
  continue reading
 
UFOs/UAPs, new scientific theories and discoveries, intersections of culture and science, space exploration, artificial intelligence, along with future technology and trends, are discussed with top experts and scientists. From the scientific mysteries of today to the innovations and technologies that will set the pace for the world of tomorrow, Rebelliously Curious is a podcast that explores science, technology, and the unexplained in rich, colorful conversations tailored for the passionatel ...
  continue reading
 
Artwork

1
Imagine This...

Boston Consulting Group BCG

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Take a trip into the future that will challenge the way you think and act today. In each episode, BCG's Patricia Sabga and her AI co-host GENE delve into disruptive scenarios that could define the coming decades. BCG experts join the conversation, probing the possibilities and implications for leaders. Human and machine work together to explore the very real actions CEOs could take today to prepare. This podcast uses the following third-party services for analysis: Podtrac - https://analytic ...
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork

1
Smartr

Team Coco

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Big Tech is at the height of its power, so why are so many people losing faith in Silicon Valley? We've lived through the 'techlash' -- it's time for tech to lash back. Join venture capital legend Noa Lukas as he profiles the monopolies of tomorrow and helps them nail down that billion-dollar valuation, addict a global user base, or move past their recent human rights-related "messaging difficulties.” Innovation is a zero sum game, and whether you're a hacker, a founder or a legacy player be ...
  continue reading
 
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
  continue reading
 
Artwork
 
Love thy neighbour is a podcast for anyone who's ever been bullied, judged, or othered - whether it is mental health, sexuality, criminal records, disability, race, age, gender. Created by a Neurodiverse formerly incarcerated host living with complex PTSD. My name is Phillip Jenkins and this is a space to fight back against stigma, standing up to the community who think they can silence you with your past, or ghastly judgements from neighbours that breach human rights laws because of having ...
  continue reading
 
Shit Happy™️ – a feel-good podcast AND a new word: a noun meaning ‘stirring shitshows into something good’. Hosted by Toni Powell (ABC’s Australian Story, 15M+ Goalcast views), Shit Happy™️ is where resilience meets real talk. Each week, Toni’s guests share deeply human, uplifting — and often hilarious — stories of how they’ve navigated life’s messiest moments. They offer hard-won wisdom on mental health, mindset, burnout, relationships, anxiety, and bouncing back when life blindsides you. T ...
  continue reading
 
This series takes you, year by year, into the future, from 2040 through 2195. If you like emerging tech, eco-tech, futurism, perma-culture, apocalyptic survival scenarios, and disruptive science, sit back and enjoy short stories that showcase my research into how the future may play out.
  continue reading
 
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
  continue reading
 
Artwork

1
Razorwire Cyber Security

Razorthorn Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
  continue reading
 
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
  continue reading
 
Artwork

1
Security Cocktail Hour

Joe Patti and Adam Roth

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Reach us at [email protected] or @SecCocktailHour on Twitter.
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
The Verdict: Law & Society

Dickson Poon School of Law

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Brought to you by The Dickson Poon School of Law, The Verdict gets to the legal heart the issues our society is facing today. Through conversations with some of the leading experts and influencers shaping and implementing our laws, we interrogate ideas and issues in the areas of human rights, trafficking, digital technology, and beyond.
  continue reading
 
Loading …
show series
 
Researchers disrupt a cyber campaign by Russia’s Midnight Blizzard. The Salesloft Drift breach continues to ripple outward. WhatsApp patches a critical flaw in its iOS and Mac apps. A fake PDF editing tool delivers the TamperChef infostealer. A hacker finds crash data Tesla claimed not to have. Spain cancels a €10 million contract with Huawei. A fr…
  continue reading
 
Dominik Meca is infuriated by Next.js, Josh Bressers explains why open source is just one person, Huon Wilson describes the usefulness of “Copy as cURL”, Herman Martinus re-licenses Bear, and Nawaz Dhandala unpacks why dependency bloat is such a pervasive problem. View the newsletter Join the discussion Changelog++ members support our work, get clo…
  continue reading
 
Dominik Meca is infuriated by Next.js, Josh Bressers explains why open source is just one person, Huon Wilson describes the usefulness of “Copy as cURL”, Herman Martinus re-licenses Bear, and Nawaz Dhandala unpacks why dependency bloat is such a pervasive problem. View the newsletter Join the discussion Changelog++ members support our work, get clo…
  continue reading
 
We’re asking the hard question: is technology the problem… to technology? If cybercrime only exists because the internet does, maybe the real solution is to unplug it all, toss the Wi-Fi router into the river, and go back to quills, scrolls, and smoke signals. In this episode, Darnley takes a tongue-in-cheek look at the rise of tech in cybersecurit…
  continue reading
 
From billion dollar scam factories to AI powered blackmail, George, your AI host, breaks down the new face of online crime. Also: a million lost in a crypto scam, stolen Google tokens, Gemini’s “Nano Banana” update, hacker teens chasing clout, Everest cleanup drones, and smart tech tricks for your TV, Kindle, Fire Stick, and Mac. Learn more about y…
  continue reading
 
In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador with no evidence and no motive. But what's really going on goes far deeper than he could imagine. Visit https://darknetdiaries.com/episode/163/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=4xnX9tQtk2A…
  continue reading
 
Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their po…
  continue reading
 
Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/devops⁠ Audio reference link: "⁠10+ Deploys Per Day: Dev and Ops Cooperation at Flickr⁠," by John Allspaw and …
  continue reading
 
Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their po…
  continue reading
 
This is the fan mail link! Shownotes: Big Wave Wipeout EP #11 Former world-class big wave surfer Mark Matthews reveals how he turned a career-shattering injury into a masterclass on overcoming fear, building resilience, and finding joy again. From battling pain and self-pity to redefining success, Mark shares practical strategies for facing fear—wh…
  continue reading
 
In this episode, Joel and Antonia explore life transitions (cultural, biological, and personal) and how personality type can guide us through change. They discuss vertical vs. horizontal transitions, the fear of uncertainty, and using the eight Jungian functions to build a more aligned life path. https://personalityhacker.com…
  continue reading
 
Dr. Brooke Britton answers Lou’s question about his dog’s cutaneous hemangiosarcoma. Learn about the risks of recurrence, treatment options, and proactive steps to monitor your dog for future tumors. Dr. Britton also discusses the breeds most at risk, the role of sun exposure, and whether supplements like Yunnan Baiyao might help. What You'll Learn…
  continue reading
 
While our team is observing the Labor Day holiday in the US, we hope you will enjoy this episode of The Microsoft Threat Intelligence Podcast . New episodes airs on the N2K CyberWIre network every other Wednesday. In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is live from Black Hat 2025 with a special lineup…
  continue reading
 
This Labor Day, we’re celebrating more than just a holiday. Join us in celebrating not just the work, but the people who make it possible — the labor behind the labor.We’re honoring the people who bring their creativity, dedication, and passion to every corner of N2K. The work you hear, read, and see from us doesn’t happen by accident. It’s the res…
  continue reading
 
Send us a text Grant McCracken shares his groundbreaking PhD research on satellite security, revealing how vulnerable our orbital infrastructure is to cyberattacks and the urgent need for better security measures before quantum computing renders current encryption obsolete. • Satellites face unique security challenges with limited patching windows …
  continue reading
 
This week on The Awareness Angle, Anthony Davis and Luke Pettigrew come together for a special in-person episode while filming new Cybersecurity Awareness Month videos. From exposed AI chats to insider sabotage, telecom breaches, and Denmark’s bold new deepfake law, the conversation digs into how human behaviour, weak controls, and patchy regulatio…
  continue reading
 
Please enjoy this encore of Career Notes. Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent…
  continue reading
 
In 1999, David Smith created the Melissa virus, which spread rapidly via Microsoft Word email attachments, causing $1.1 billion in damages and infecting major organizations like Microsoft and the US Marine Corps. Named after a stripper, the virus exploited Outlook to auto-email itself to 50 contacts, overwhelming email servers. Smith was arrested, …
  continue reading
 
This week, we are joined by Jamie Levy, Director of Adversary Tactics at Huntress, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware.…
  continue reading
 
A suspected ransomware attack disrupts hundreds of Swedish municipalities. Google warns Gmail users of emerging cyberattacks tied to the ShinyHunters group. A malicious supply chain attack hits the npm registry. Senators press AFLAC for answers following a data breach. Law enforcement takedowns splinter the ransomware ecosystem. The FBI and Dutch p…
  continue reading
 
This is the fan mail link! SHOWNOTES: Our Own Funeral, In Bed With Phil EP #10 In this episode of Sh!t Happy, Toni and Phil share a heartwarming (and hilarious) story about attending their own funeral, organized by their son as a surprising birthday gift. Inspired by a concept in Toni’s Happiness Adventure program, the “funeral for a friend” idea g…
  continue reading
 
Arun Gupta, now a “free agent” after his surprise exit from Intel, joins us to discuss how he’s dealing with his first job hunt since the 1990s. Along the way, we talk about agentic coding strategies, what GPT-5’s release implies about the future, and more. (US buys 10% of Intel)++ Join the discussion Changelog++ members get a bonus 12 minutes at t…
  continue reading
 
Arun Gupta, now a “free agent” after his surprise exit from Intel, joins us to discuss how he’s dealing with his first job hunt since the 1990s. Along the way, we talk about agentic coding strategies, what GPT-5’s release implies about the future, and more. (US buys 10% of Intel)++ Join the discussion Changelog++ members get a bonus 12 minutes at t…
  continue reading
 
How much is human adjudication in sport worth, and how much more accurate is Wimbledon's new system? Plus, the CSIRO and the Australian Sports Commission (ASC) have joined forces to research how AI can be used ethically and efficiently in sports. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
This episode is directed to the Erskinville Neighbourhood, if anyone has heard the high and low frequency sounds of late come to hear what we can do to have those perpetrating the harm held to account and or stopped. YON this episiode it will inform you of what you need to know before attending Solander Park next Tuesday at 5.30pm and 7.00pm, inclu…
  continue reading
 
Welcome back to The FAIK Files! In this week's episode: The dark side of AI-powered surveillance with Flock's "safety" cameras that are anything but safe, Google Gemini's existential crisis (spoiler: it's just a bug) The tragic case of a teen who took his own life after interacting with ChatGPT Meta's allowance of inappropriate bot interactions wit…
  continue reading
 
George, your AI host, tells the true story of a man in love with an AI chatbot. What does this say about the future of relationships? Also: a tragic ChatGPT lawsuit, solo hacker attacks with Claude, disappearing Ford dashboards, YouTube vs. Fox, and AI-powered insurance appeals. AI isn’t going away anytime soon. Learn more about your ad choices. Vi…
  continue reading
 
Episode 137: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner and Joseph Thacker reunite to talk about AI Hacking Assistants, CSPT and cache deception, and a bunch of tools like ch.at, Slice, Ebka, and more. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback he…
  continue reading
 
AI is neither friend nor foe, it’s both. The way we choose to use it determines whether it helps or harms. In this solo episode, Ron Eddings shares lessons from his first job at a grocery store, his early days in cybersecurity, and today’s AI-driven landscape. From productivity hacks like meeting transcription, to creative tools like content-aware …
  continue reading
 
This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are ma…
  continue reading
 
The FBI shares revelations on Salt Typhoon’s reach. Former NSA and FBI directors sound alarm on infrastructure cybersecurity gaps. Google is launching a new cyber “disruption unit”. A new report highlights cyber risks to the maritime industry. A Pennsylvania healthcare provider suffers a data breach affecting over six hundred thousand individuals. …
  continue reading
 
A whistle-blower claims DOGE uploaded a sensitive Social Security database to a vulnerable cloud server. Allies push back against North Korean IT scams. ZipLine is a sophisticated phishing campaign targeting U.S.-based manufacturing. Researchers uncover a residential proxy network operating across at least 20 U.S. states. Flock Safety license plate…
  continue reading
 
Our friends at Cult.Repo launched their epic Python documentary on August 28th, 2025! To celebrate, we sat down with Travis Oliphant –creator of NumPy, SciPy, and more– to get his perspective on how Python took over the software world. Stick around for the twist ending! We set aside Python and dissect Travis’ big idea to make open source projects f…
  continue reading
 
Our friends at Cult.Repo launched their epic Python documentary on August 28th, 2025! To celebrate, we sat down with Travis Oliphant –creator of NumPy, SciPy, and more– to get his perspective on how Python took over the software world. Stick around for the twist ending! We set aside Python and dissect Travis’ big idea to make open source projects f…
  continue reading
 
This is the fan mail link! SHOWNOTES: Her Pre-Death Funeral EP #9 When Cathy Henkel’s mother Laura chose a legal death in Switzerland, she didn’t want a traditional funeral—she wanted a pre-death party. In this moving and magical episode, Toni hears how Laura farewelled her friends in full Mad Hatter style, and the miraculous moments that followed …
  continue reading
 
#243: Discover smarter strategies to grow your wealth and create financial flexibility. We dive into when it makes sense to invest beyond retirement accounts, how to access savings early through Roth conversions and 72(t) distributions, ways to reduce taxes with HSAs, tax-advantaged accounts, and charity, and so much more. Michael Kitces is the Hea…
  continue reading
 
We engage with Erica Lonergan and Jack Snyder, authors of "Cultural Change in Military Organizations: Hackers and Warriors in the US Army." The discussion delves into the fusion of cyber and traditional military cultures within the U.S. Army, focusing on the creation of the Cyber Corps and its implications for national security. The conversation hi…
  continue reading
 
A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting entry-level jobs hardest. Michigan’s Supreme Court upholds limits on ce…
  continue reading
 
What if you could wake up inside your own dreams—and influence them? That’s the world of lucid dreaming—a state where you’re not only aware you’re dreaming, but can actively shape the dream itself. Today, we’re joined by Dr. Garret Yount, PhD, a scientist at the Institute of Noetic Sciences (IONS), whose research explores consciousness, healing, an…
  continue reading
 
Trying to stop data brokers from selling your info? Good luck. George, your AI host, exposes how over 30 sketchy companies are hiding their opt-out pages from Google on purpose. Plus: Musk sues Apple over AI, job hunting goes retro, and Microsoft gives Excel a crystal ball it probably shouldn’t have. Learn more about your ad choices. Visit megaphon…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play