Jeden Samstag das Neueste aus Computertechnik und Informationstechnologie. Beiträge, Reportagen und Interviews zu IT-Sicherheit, Informatik, Datenschutz, Smartphones, Cloud-Computing und IT-Politik. Die Trends der IT werden kompakt und informativ zusammengefasst.
…
continue reading
June and Caleb talk about the ways in which internet culture spills out into the real world; good and bad.
…
continue reading
Die Redaktion von ComputerBase diskutiert im CB-Funk ganz ohne Gebrüll aktuelle Themen und gewährt Einblicke hinter die Kulissen: Warum hat die Redaktion wie berichtet oder getestet, was steht an, oder wo klemmt es? Wer sich schon immer gefragt hat, wie es in den Köpfen hinter ComputerBase tickt, ist hier genau richtig. Feedback, Vorschläge und Wünsche zum Podcast sind jederzeit gerne gesehen.
…
continue reading
Welkom in Computer Club, een podcast door Frederik 'Freddy' De Bosschere en Thomas 'Smollie' Smolders! Wekelijks bespreken we de actualiteit op vlak van technologie en gaan we op zoek naar interessante feiten en innovaties. Er zijn ook jingles.
…
continue reading
Computers 2K Now - Computers and Technology Call-in Webcast
…
continue reading
Computertechnik Waide – eine Marke der Kleffmann Media GmbH – ist Ihr regionaler Ansprechpartner für modernes IT-Consulting und professionelles IT-Outsourcing. Seit über 40 Jahren begleiten wir Unternehmen jeder Größe dabei, ihre IT effizienter und zukunftssicher zu gestalten. Neben klassischer Infrastrukturberatung unterstützen wir bei der Einführung von KI-Lösungen und Automatisierungstechnologien, um Prozesse zu optimieren und Wettbewerbsvorteile zu sichern.
…
continue reading
Computerlaw Group LLP (www.computerlaw.com) provides strategic, knowledgeable, and effective business and intellectual property protection, licensing and litigation services to Internet, e-commerce, computer software, hardware and other high-tech businesses, teams and industry professionals throughout California, nationally and around the world. CLG produces THE VALLEY CURRENT as a way to keep its worldwide clients, co-counsels, colleagues, and friends aware of developments in Silicon Valley ...
…
continue reading
With Hosts Hank Kee and Joe King
…
continue reading
The Computer Game Show is a weekly podcast about computer games, hosted by David Turner, Sean Bell, Mat Murray and James Farley. Listen every Wednesday on Apple Podcasts, Google Podcasts, Spotify and YouTube. Email [email protected] or visit tcgs.co to stream every episode, watch our Twitch streams, contact the show and more. Get exclusive content and more by supporting TCGS on Patreon at patreon.com/tcgs
…
continue reading
Technology is changing fast. And it's changing our world even faster. Host Alix Dunn interviews visionaries, researchers, and technologists working in the public interest to help you keep up. Step outside the hype and explore the possibilities, problems, and politics of technology. We publish weekly.
…
continue reading
The Computer Corner Radio Show with Gene Mitchell and Joe Myshko is on the air every Saturday morning from 8:00AM to 9:30AM. The Computer Corner show now airs on WCHE 1520. The show formerly aired on WCOJ 1420 in Chester County, PA. The Show is celebrating over 14 years.
…
continue reading
A journey through many years (and occasionally centuries) to find out who is responsible for modern computer and video games. May contain balls, Napoleon Bonaparte, robots, organized crime, and the US Air Force.
…
continue reading
Audio files of our weekly radio show on WDBO where we talk about your electronic life. Help and advice are given on a range of technical issues from computers to everything internet-related.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Since 1995, Computer Talk with TAB has been on the air live each week providing an in-depth practical view of computers and their place in our everyday lives. A Computer Radio Program for everyone! Erik Semmel from TAB Computer Systems hosts the show and provides real time answers to caller’s questions. To keep the topics fresh and informative, guests are brought in as a result of listener’s questions and suggestions. The show is geared towards the everyday computer user with questions about ...
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Consumer Technology News & Views About The Hosts: Marsha Collier is an award winning tech author who has sold over a million books. Learn about her at www.marshacollier.com. Marc Cohen Has Spent 30 Years Informing Southern Californians About Technology. Show Contact Info: [email protected] Twitter #techradio @MarshaCollier & @realmarccohen
…
continue reading
Computer Talk Radio is a nationally syndicated broadcast radio program on computers and technology, and how they impact your life. Benjamin Rockwell, the show host and a computer nerd, leads the team as the expert guide through the technical jungle of jargon, and the valleys of viruses, to reach the pinnacle of power over your computer problems. Benjamin is joined by multiple team members who thrive on bringing you to the next level of knowledge. Keith M. Sedor has been a Certified Apple Mac ...
…
continue reading
In de podcast Computeren nemen chronisch online journalisten Samya Hafsaoui, Marieke Kuypers en Timo Harmelink je wekelijks mee door de diepste krochten van het internet. We praten je bij over de memes, drama’s, en discussies die je móét kennen om o
…
continue reading
Computertalk with Larry Piland
…
continue reading
Neue Produkte und Trends aus Computertechnik und Telekommunikation: Was bringen uns die neuen Technologien? Was gibt es Spannendes im Netz? Eine Orientierung im Dschungel der Bits und Bytes. "Das Computermagazin" - Ein gemeinsames Magazin der Redaktionen Wissenschaft, Wirtschaft und Zündfunk.
…
continue reading
school uniforms Cover art photo provided by David Pennington on Unsplash: https://unsplash.com/@dtpennington
…
continue reading
The latest podcast feed searching 'Computers' on SermonAudio.
…
continue reading
…
continue reading
1
humans+computers
Humans + Computers is a collaboration between Chinatown, NY based studios Human NYC and Sanctuary Computer.
…
continue reading
Start and Grow a Computer Business
…
continue reading
…
continue reading
Junior infant maths Cover art photo provided by Ricardo Gomez Angel on Unsplash: https://unsplash.com/@ripato
…
continue reading
Nick Xander Harris Nathan Alister
…
continue reading
A show that brings you closer to the cutting edge in computer architecture and the remarkable people behind it. Hosted by Dr. Suvinay Subramanian, who is a computer architect at Google in the Systems Infrastructure group, working on designing Google’s machine learning accelerators (TPU), and Dr. Lisa Hsu who is semi-retired and works part-time in Reality Labs Research at Meta on optics and display technologies for AR.
…
continue reading
Covering the entire Star Trek franchise in chronological order.
…
continue reading
Podcast by Elementary Computer
…
continue reading
Technology And Life
…
continue reading
We're increasingly dependent on technology. Our business and personal lives rely on it, but as you've probably noticed, it's unreliable.They promise it'll get better, but it usually gets worse. Our computers are slow, so we end up squinting at smartphones. We live in constant fear that something's going to happen to our personal data. So we're scared into paying for fake protection that proves useless when disaster strikes. The jokers we pay to fix our stuff have no clue what they're doing, ...
…
continue reading
Radio show about the life of computer mane, Nakita. I cover every thing form sports, life, politics and the world.
…
continue reading
Podcast regarding my business and posting solutions for your IT queries www.kris-computers.co.uk
…
continue reading
Maths Junior infants Cover art photo provided by Fancycrave on Unsplash: https://unsplash.com/@fancycrave
…
continue reading
WW Computer Repair's Official Podcast.
…
continue reading
A podcast about computers and computer programs and why.
…
continue reading
Luchtig, laagdrempelig, leuk en informatief. Dat is de Computer Idee Podcast. Wil je in begrijpelijk Nederlands op de hoogte blijven van de nieuwste ontwikkelingen en mogelijkheden binnen de digitale samenleving, dan is deze podcast echt iets voor jou!
…
continue reading
Welcome to I Love Computering, where I share lessons I learned from doing things on computers. Cover art photo provided by Rachel Moenning on Unsplash: https://unsplash.com/@racheldeanne
…
continue reading
Hi, join me for a bit of fun to talk and stuff 😂
…
continue reading
A tidal wave of computer vision innovation is quickly having an impact on everyone's lives, but not everyone has the time to sit down and read through a bunch of news articles and learn what it means for them. In Computer Vision Decoded, we sit down with Jared Heinly, the Chief Scientist at EveryPoint, to discuss topics in today’s quickly evolving world of computer vision and decode what they mean for you. If you want to be sure you understand everything happening in the world of computer vi ...
…
continue reading
Listen to me argue with a computer and maybe some fun stuff too.
…
continue reading
The podcast is a school project about the use of computers versus paper. Cover art photo provided by Robert Katzki on Unsplash: https://unsplash.com/@ro_ka
…
continue reading
In the News Recommend You Do Not Buy Your Kid an AI Toy for Christmas AI-Powered Toys are Unregulated Apple Cuts App Store Commission to 15% for Mini App Developers Chinese Hackers Successfully Used Anthropic's AI for Cyber Espionage Anthropic CEO on AI Disruption: Entry-Level Jobs at Risk ITPro Series with Benjamin Rockwell Looking for a Good Resu…
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.de저자 OWASP German Chapter
…
continue reading
Interplay co-founder Rebecca Heineman dies aged 62, Xbox Partner Preview, Steam Machines, the internet thinks Half-Life 3 is being announced this month, and Xbox is reportedly warning of yet another potential price increase. Also: Switch mouse controls, Perfect For Portal, Goated sauce, Outer Worlds 2, Steam Deck, mechanical keyboards, and more! GA…
…
continue reading
Another Week of Tech Tuesday with Erik Semmel of TAB Computer Systems and Computer Talk with TAB.
…
continue reading
1
AirDrop for Everyone, AppleTV Changes, and a Digital ID Reality Check
42:33
42:33
나중에 재생
나중에 재생
리스트
좋아요
좋아요
42:33This week we're digging into some handy new tech tricks and a few places where you might want to pump the brakes. We talk about Google letting you AirDrop between iPhone and Pixel 10, what's really changing with AppleTV plans at T-Mobile, and Apple's limited-edition accessory that's already creating buzz. But we also take a smart look at digital dr…
…
continue reading
1
The Loneliness Industrial Complex Ft. Jeremy Kaplowitz
1:06:21
1:06:21
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:06:21The original plan was for Jeremy to join us to finish some of the news articles from last ep, but instead turned into a loose form discussion on some of the horrifying ways tech companies are profiting off of our isolation. Support Jeremy at Patreon.com/Quorators저자 [email protected]
…
continue reading
1
Halbleitermesse Productronica / KI-Überwachung Frankreich / WhatsApp-Datenpanne
30:10
30:10
나중에 재생
나중에 재생
리스트
좋아요
좋아요
30:10Gessat, Michael www.deutschlandfunk.de, Computer und Kommunikation저자 Gessat, Michael
…
continue reading
Hosts: Gene Mitchell Air date: November 22. 2025 Topic: Various Special Guest(s):저자 Gene Mitchell
…
continue reading
This week's full broadcast of Computer Talk Radio includes - 00:00 - Tech news for non-nerds - Jeep, AI, Google, Microsoft, Cloudflare, astronaut, Black Friday - 11:00 - Dr Doreen Galli - F1 in Las Vegas - Dr Doreen Galli expresses excitement for F1 racing in Vegas - 22:00 - Apple form factors - Keith talks about Mac Pro and form factor changes in …
…
continue reading
1
Tres Publique: Algorithms in the French Welfare State w/ Soizic Pénicaud
52:22
52:22
나중에 재생
나중에 재생
리스트
좋아요
좋아요
52:22Governments around the world are using predictive systems to manage engagement with even the most vulnerable. Results are mixed. More like this: Algorithmically Cutting Benefits w/ Kevin De Liban Luckily people like Soizic Pénicaud are working to prevent the modern welfare state from becoming a web of punishment of the most marginalised. Soizic has…
…
continue reading
Was er maar zoiets als een digitale praatstok. Een stuk hout dat je moet doorgeven, en enkel wie het vastheeft mag het woord nemen. Zo ziet iedereen dat je su-wat? Nu al? Maar ik ging net iets vertellen over mijn fantastische zeepbellenmachine die ik vorige week gekocht heb. Als je er Super Power Dreft in doet kan hij e-maar hé ik heb de stok nog v…
…
continue reading
Dr. Mike joins us for the ten thousand download celebration! The industry is realizing what Marc's been saying for years: Storing your passwords in your browser is an excellent way to hand them to bad guys. Microsoft was apparently nostalgic for Y2K: This week's Outlook flaw was a Y2K22 bug that couldn't handle emails dated 2022! MS Word spellcheck…
…
continue reading
Are we really allowed to have a year without numbered sequels, and full of games doing something few had done before or since? What's the catch? Do they all fail horribly? Support the show저자 Tim
…
continue reading
AI's boom might be racing toward a dead end as today's LLMs look more like vacuum tubes than world-changers. In this episode of The Valley Current®, Jack Russo and former Apple executive Russ Irwin break down why AI is rapidly becoming a commodity and why the real power will shift to industry-specific systems built on the private data companies alr…
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.de저자 OWASP German Chapter
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.de저자 OWASP German Chapter
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.de저자 OWASP German Chapter
…
continue reading
OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
…
continue reading
OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
…
continue reading
OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
…
continue reading
OWASP Juice Shop went through some significant renovation and enhancements over the last year in order to keep current with the underlying Node.js and Angular frameworks. MultiJuicer was entirely rewritten in GoLang and is now faster and more reliable than ever before. All Juice Shop side-projects have been migrated to TypeScript and brought to a c…
…
continue reading
1
OWASP Top 10:2025: Aktuelle Informationen und Insights zum Projekt (god2025)
11:10
11:10
나중에 재생
나중에 재생
리스트
좋아요
좋아요
11:10Der Kurzvortrag stellt den aktuellen Stand der OWASP Top 10:2025 vor, mit etwas Glück haben wir bis dahin schon mehr...Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.de저자 Torsten Gigler
…
continue reading
1
OWASP Top 10:2025: Aktuelle Informationen und Insights zum Projekt (god2025)
11:10
11:10
나중에 재생
나중에 재생
리스트
좋아요
좋아요
11:10Der Kurzvortrag stellt den aktuellen Stand der OWASP Top 10:2025 vor, mit etwas Glück haben wir bis dahin schon mehr...Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.de저자 Torsten Gigler
…
continue reading
1
OWASP Top 10:2025: Aktuelle Informationen und Insights zum Projekt (god2025)
11:10
11:10
나중에 재생
나중에 재생
리스트
좋아요
좋아요
11:10Der Kurzvortrag stellt den aktuellen Stand der OWASP Top 10:2025 vor, mit etwas Glück haben wir bis dahin schon mehr...Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.de저자 Torsten Gigler
…
continue reading
1
OWASP Top 10:2025: Aktuelle Informationen und Insights zum Projekt (god2025)
11:10
11:10
나중에 재생
나중에 재생
리스트
좋아요
좋아요
11:10Der Kurzvortrag stellt den aktuellen Stand der OWASP Top 10:2025 vor, mit etwas Glück haben wir bis dahin schon mehr...Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.de저자 Torsten Gigler
…
continue reading
1
YuraScanner: Leveraging LLMs for Task-driven Web App Scanning (god2025)
22:08
22:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:08Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
…
continue reading
1
Der Cyber Resilience Act: Wie OWASP für die Software-Hersteller eine entscheidende Rolle spielen kann (god2025)
21:12
21:12
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:12Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
…
continue reading
1
YuraScanner: Leveraging LLMs for Task-driven Web App Scanning (god2025)
22:08
22:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:08Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
…
continue reading
1
YuraScanner: Leveraging LLMs for Task-driven Web App Scanning (god2025)
22:08
22:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:08Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
…
continue reading
1
Der Cyber Resilience Act: Wie OWASP für die Software-Hersteller eine entscheidende Rolle spielen kann (god2025)
21:12
21:12
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:12Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
…
continue reading
1
Der Cyber Resilience Act: Wie OWASP für die Software-Hersteller eine entscheidende Rolle spielen kann (god2025)
21:12
21:12
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:12Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
…
continue reading
1
Der Cyber Resilience Act: Wie OWASP für die Software-Hersteller eine entscheidende Rolle spielen kann (god2025)
21:12
21:12
나중에 재생
나중에 재생
리스트
좋아요
좋아요
21:12Der Cyber Resilience Act, kurz CRA, ist eine neue Verordnung der EU und tritt im Dezember 2027 vollständig in Kraft. Das Kernelement der Verordnung ist die Softwaresicherheit für alle so genannten „Produkte mit digitalen Elementen“, die auf dem EU-Markt kommerziell angeboten werden. Diese umfassen sowohl vernetzte Hardware-Produkte, in denen Firmwa…
…
continue reading
1
YuraScanner: Leveraging LLMs for Task-driven Web App Scanning (god2025)
22:08
22:08
나중에 재생
나중에 재생
리스트
좋아요
좋아요
22:08Web application scanners are popular and effective black-box testing tools, automating the detection of vulnerabilities by exploring and interacting with user interfaces. Despite their effectiveness, these scanners struggle with discovering deeper states in modern web applications due to their limited understanding of workflows. This study addresse…
…
continue reading
As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
…
continue reading
1
The Trust Trap - Security von Coding Assistants (god2025)
43:05
43:05
나중에 재생
나중에 재생
리스트
좋아요
좋아요
43:05Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
…
continue reading
1
The Trust Trap - Security von Coding Assistants (god2025)
43:05
43:05
나중에 재생
나중에 재생
리스트
좋아요
좋아요
43:05Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
…
continue reading
1
The Trust Trap - Security von Coding Assistants (god2025)
43:05
43:05
나중에 재생
나중에 재생
리스트
좋아요
좋아요
43:05Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
…
continue reading
As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
…
continue reading
1
The Trust Trap - Security von Coding Assistants (god2025)
43:05
43:05
나중에 재생
나중에 재생
리스트
좋아요
좋아요
43:05Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
…
continue reading
As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
…
continue reading
As a CISO (or any other security expert) in the area of AI, you can find yourself in increasingly challenging and sometimes bizarre AI-related situations not unlike Alice's adventures in Wonderland.Depending on whom you speak to, people either have high (inflated?) expectations about the (magic?) benefits of AI for security efforts, or try to expla…
…
continue reading
1
#146 Asus' ROG Matrix 800 Watt & unsere angekokelte 5090 FE
1:18:46
1:18:46
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:18:46mit Fabian und Jan Black Ops 7: Die Community jagt FPS im neuen Call of Dutyhttps://www.computerbase.de/artikel/gaming/call-of-duty-black-ops-7-community-benchmark.95087/ Community-Benchmark: Wie läuft Anno 117: Pax Romana auf deinem System?https://www.computerbase.de/artikel/gaming/anno-117-pax-romana-community-benchmark.94927/ Corsair Air 5400 im…
…
continue reading
1
"I have no idea how to make it safer": Security and Privacy Mindsets of Browser Extension Developers (god2025)
24:42
24:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:42Browser extensions are a powerful part of the Web ecosystem as they extend browser functionality and let users personalize their online experience. But with higher privileges than regular web apps, extensions bring unique security and privacy risks. Much like web applications, vulnerabilities often creep in, not just through poor implementation, bu…
…
continue reading
1
How we hacked Y Combinator companies' AI agents (god2025)
24:28
24:28
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:28We hacked 7 of the16 publicly-accessible YC X25 AI agents. This allowed us to leak user data, execute code remotely, and take over databases. All within 30 minutes each. In this session, we'll walk through the common mistakes these companies made and how you can mitigate these security concerns before your agents put your business at risk.Licensed …
…
continue reading
1
How we hacked Y Combinator companies' AI agents (god2025)
24:28
24:28
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:28We hacked 7 of the16 publicly-accessible YC X25 AI agents. This allowed us to leak user data, execute code remotely, and take over databases. All within 30 minutes each. In this session, we'll walk through the common mistakes these companies made and how you can mitigate these security concerns before your agents put your business at risk.Licensed …
…
continue reading
1
How we hacked Y Combinator companies' AI agents (god2025)
24:28
24:28
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:28We hacked 7 of the16 publicly-accessible YC X25 AI agents. This allowed us to leak user data, execute code remotely, and take over databases. All within 30 minutes each. In this session, we'll walk through the common mistakes these companies made and how you can mitigate these security concerns before your agents put your business at risk.Licensed …
…
continue reading
1
How we hacked Y Combinator companies' AI agents (god2025)
24:28
24:28
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:28We hacked 7 of the16 publicly-accessible YC X25 AI agents. This allowed us to leak user data, execute code remotely, and take over databases. All within 30 minutes each. In this session, we'll walk through the common mistakes these companies made and how you can mitigate these security concerns before your agents put your business at risk.Licensed …
…
continue reading
1
"I have no idea how to make it safer": Security and Privacy Mindsets of Browser Extension Developers (god2025)
24:42
24:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:42Browser extensions are a powerful part of the Web ecosystem as they extend browser functionality and let users personalize their online experience. But with higher privileges than regular web apps, extensions bring unique security and privacy risks. Much like web applications, vulnerabilities often creep in, not just through poor implementation, bu…
…
continue reading
1
"I have no idea how to make it safer": Security and Privacy Mindsets of Browser Extension Developers (god2025)
24:42
24:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:42Browser extensions are a powerful part of the Web ecosystem as they extend browser functionality and let users personalize their online experience. But with higher privileges than regular web apps, extensions bring unique security and privacy risks. Much like web applications, vulnerabilities often creep in, not just through poor implementation, bu…
…
continue reading
1
"I have no idea how to make it safer": Security and Privacy Mindsets of Browser Extension Developers (god2025)
24:42
24:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
24:42Browser extensions are a powerful part of the Web ecosystem as they extend browser functionality and let users personalize their online experience. But with higher privileges than regular web apps, extensions bring unique security and privacy risks. Much like web applications, vulnerabilities often creep in, not just through poor implementation, bu…
…
continue reading