hacker
Alyssa Miller: Charting the Course Through InfoSec and Aviation
In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey ...
Educating the Next Cybersecurity Generation with Tib3rius
In this episode we explore the remarkable journey of Tib3rius, a web application hacking expert and content creator. In this engaging conversation, we discuss: Tib3rius’ passion for community education and content creation ...
Meet Hackie-AI, The New Kid on the Block.
Meet Hackie-AI, The New Kid on the Block.2 min read·Just now--Seeing global hackers on Interpol, FBI, and Scotland Yard’s top ten list may soon become a thing of the past. Replacing the ...
Is that how it works? Hacking and scamming in popular TV shows
We like a good hacker story—and like the screens we watch them on, these stories come in wide array of shapes and sizes. ...
SaaS Attacks: Compromising an Organization without Touching the Network
In this episode Luke Jennings VP of Research & Development from Push Security joins us to discuss SaaS attacks and how its possible to compromise an organization without touching a single endpoint ...
NY Courts: Who is Liable When Cryptocurrency is Stolen?
One of the great things about the blockchain and cryptocurrency is the fact that it operates outside the commercial banking system. Unfortunately, this means that when cryptocurrency is stolen (or, more accurately, ...
Attacker ID’ed After Infecting Own Computer With Malware
A threat actor that goes by the name of “La_Citrix” inadvertently infected his own computer. Cyberthreat research firm sent his information on to law enforcement ...
How to Break Into a Cybersecurity Career – Phillip Wylie
In this exciting episode of our podcast we have the pleasure of speaking with Phillip Wylie, a remarkable professional with a captivating career in cybersecurity. Join us as we discuss Phillip’s unique ...
The Legacy of The Hacker Manifesto
I was 11 years young when The Hacker Manifesto was originally published in 1986 (yes, I’m that old). I had no idea about the manifesto at that age but several years later ...
Smart Phone, Smart Watch, Smart Pay, Smart?
Smart Phone, Smart Watch, Smart Pay, Smart?How safe is smart?The idea of never needing to carry cash or debit cards looks pretty appealing, right? Never worry about someone trying to steal your ...