Logo
Medium 7957a82ac4a668e2c7fa968193d3c2c0acee1586

Notorious Hackers

iHeartPodcasts
Flux : TechStuff
Cybersecurity company Kaspersky has a list of the most notorious hackers of all time. We look at three of the entries, from the loose confederation of...
Medium c6b19694d81c745f631173bd2b91db2c96a0f7ce

Alan Hacker

BBC Radio 4
...career as a clarinettist with the London Philharmonic Orchestra. However, when he was 26, Alan Hacker was permanently disabled by a thrombosis on his spinal column. He'll be talking to Sue...
Medium c9f59e3234927d49d36d99a33a3476beae31f202

Episode 264: Hackers

legacymusichour@gmail.com (Brent Weinbach and Rob F. Switch)
Not really sure why this episode is called "Hackers."  Maybe the boizz talk about hacking at one point, but they definitely talk about other...
Medium c9f59e3234927d49d36d99a33a3476beae31f202

Episode 264: Hackers

legacymusichour@gmail.com (Brent Weinbach and Rob F. Switch)
Not really sure why this episode is called "Hackers."  Maybe the boizz talk about hacking at one point, but they definitely talk about other...
Medium 47eb9237177e9bd39f2dc1bf65bf655f8345c355

The Hacker's Mind

The Lawfare Institute
...well-known security expert and lecturer at Harvard's Kennedy School, answers in his new book, “A Hacker's Mind: How the Powerful Bend Society's Rules and How to Bend Them Back.” Jack Goldsmith...
Medium 20859dfacb5fc0191f0f3fb65e5f924027ad6b22
Parker Moore joined the show to talk with Adam about blogging for hackers with Jekyll and GitHub Pages. Join the discussion Changelog++ members support our work, get closer...
Medium 231eeaa4468e3a5ff9cace254ece20cd3cd87e5c
Flux : TechStuff
Chinese-backed hackers are infiltrating computer systems by compromising routers. Some security researchers say that modern GPUs can...
Medium 231eeaa4468e3a5ff9cace254ece20cd3cd87e5c
Flux : TechStuff
...the security it relies on for its Azure cloud platform. Microsoft itself warns that Russian hackers are using Microsoft Teams to target a small number of organizations in an effort to...
Medium 231eeaa4468e3a5ff9cace254ece20cd3cd87e5c
Flux : TechStuff
Cybersecurity researchers say that a 16-year-old boy in England is the ringleader of the Lapsus$ hacker group that compromised Okta and other companies earlier this week. We learn which big tech...
Medium edc036c69117c8b817a2fd49e1b65f444ddf3b17

Film Studies - Hackers (Kids on Bytes)

rolistespod@gmail.com (Kalum)
...Cozy Den", "Something Is Wrong Here" and "Fly Softly",Phil Vecchione, co-host... Continue reading Film Studies - Hackers (Kids on Bytes)
Medium 45a1830ba4e234ac39b90b80aa97a5ca02316546
Flux : CarStuff
Medium 4e6deb945d7d7a163faf517f640ee58f9f74f623

Ep271: Clint Walsh of Dot Hacker

Nate Goyer, Record Collector, Music Fan, Vinyl Maniac
Dot Hacker is an amalgamation of four brilliant musicians, balancing the band alongside careers playing with stadium-filling...
Medium 47eb9237177e9bd39f2dc1bf65bf655f8345c355
This week, Shane sits down with law professor and hacker historian Scott Shapiro to rant, and rave, about hacker movies. From War Games to the Die Hard franchise to...
Medium 47eb9237177e9bd39f2dc1bf65bf655f8345c355
The “hackers for hire” industry continues to grow unbothered. Reports in recent years have uncovered details about...
Medium c730e879cdeb1bab0eff837b33d6ec054cb1b708
Flux : The Third Web
In Brief: The DAO hacker and Geth attacker have left a trail of evidence that can provide high quality identifying...
résultats 1 - 15 sur 1046 au total
Afin de préserver nos ressources serveurs, très solicitées par des robots, et pour garantir la meilleure expérience à nos utilisateur·ices, seule la première page de résultats est disponible.

Merci de vous connecter pour accéder aux résultats suivants.
Se connecter