Since 2015
…
continue reading
O podcast oficial do Data Hackers: a maior comunidade de dados do Brasil. Conheça nosso site oficial: datahackers.com.br
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Podcast de conversaciones reales entre emprendedores, empresarios y expertas sobre negocios, emprendimiento Marketing y tecnología. Para fortalecer nuestros negocios y llevarlos al siguiente nivel.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Growth (anteriormente En.Digital) es el podcast de negocios digitales de Product Hackers. Cada semana, entrevistas con los principales referentes de los negocios digitales y startups que más crecen. En este podcast aprenderás las claves reales del crecimiento de los negocios digitales, de la mano de sus fundadores o responsables de crecimiento. Presentado con muchísimo cariño por José Carlos Cortizo (Corti).
…
continue reading
Tu noticiero de ciberseguridad hecho podcast. La mejor manera de estar al día en temas de hacking, ciberamenazas y privacidad en Internet. Desgranamos las últimas noticias más relevantes para hacerlas accesibles a todos los públicos. Actualidad y divulgación a cargo de Martín Vigo y Alexis Porros. Suscríbete y escúchanos cualquier plataforma de podcasts. 🎙️ Apple Podcasts: apple.co/3bMSuSE 🎙️ Spotify: spoti.fi/2VB7tIM 🎙️ iVoox: bit.ly/2RHkC1E 🎙️ Google Podcasts: bit.ly/2QTDZqT Síguenos en Re ...
…
continue reading
The HackerSploit podcast is aimed at educating anyone interested in Infosec, Hacking or Cybersecurity.
…
continue reading
El podcast esencial para emprendedores, managers y directivos que buscan liderar la transformación digital. Analizamos las últimas tendencias y casos de éxito en salud, retail, banca, finanzas y entretenimiento. Aprende cómo innovar y mantenerte a la vanguardia en tu industria. Presentado por 4Geeks.
…
continue reading
Neste podcast iremos conversar com diversos hackers para entender como o mundo do hacking funciona.
…
continue reading
What are hackers? Cover art photo provided by Andrew Ridley on Unsplash: https://unsplash.com/@aridley88
…
continue reading
Hacked
…
continue reading
A podcast dedicated to teaching you how to protect yourself online. dontclickonthat.com
…
continue reading
Productivity Hackers (PH) is a podcast all about becoming more productive and successful
…
continue reading
Two Friends Figuring Out The Balance Between Contentment and Self-Improvement
…
continue reading
In the shadows of the digital world, where anonymity is power and information is currency, battle lines are drawn not with bullets but with code. This show takes listeners deep into the heart of cyberspace’s most high-stakes confrontations — where rogue programmers exploit vulnerabilities, corporations scramble to secure their data empires, and government agencies wage invisible wars across invisible lines. It’s a realm shaped by encryption, espionage, whistleblowers, and wild ambition. From ...
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
…
continue reading
English Assessments
…
continue reading
…
continue reading
Everyday society depends more on electronics, social media etc, and by doing so they expose their private data to the public eye. Each Saturday, join Hackers Con Calle is a group of Cyber Security professionals dedicated to inform the audience of current trends and a how to protect the digital life.
…
continue reading
Información sobre las células madre Cover art photo provided by Adam Frazier on Unsplash: https://unsplash.com/@galaxiez9
…
continue reading

1
Hackers Ouverts - Radio C-Lab
selon les dispos de chacun: Johanna, Morgan, Flavien Merwan, Olivier & Romain
L'émission qui décode !
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
Each episode our panel of International Map Hackers will dissect a buzzword from the world of GIS. We’ll give you concrete definitions, practical applications, and share where we hope the technology can go from here.
…
continue reading
Ben Orenstein and Adam Wathan on surviving the transition from dev to founder.
…
continue reading
O projecto local dos Legal Hackers em Lisboa. Um podcast sobre Direito e Tecnologia.
…
continue reading
I'm going to share tricks and methods about Facebook advertising and on how to leverage the power of social media to make more sales and acquire more leads.
…
continue reading
Podcast by BIZ HACKERS PODCAST
…
continue reading
Stories of people hacking on weird and interesting projects.
…
continue reading

1
Culture Hackers
Robbe Richman and a cast of hackers, troublemakers, movers and shakers, Robbe Richman
A show all about culture hacking - at companies, in business and the world. The first episodes are the free audio book of Robert Richman's "Culture Blueprint."
…
continue reading
Get better every day with the Muslim Life Hackers podcast. Through conversations with experts, leaders and inspiring individuals, we are going to give you actionable insights help you win in this life and the next.
…
continue reading
A place where Human and Online collide... The Human Hackers podcast is all about you. It's about exploring the trials and tribulations of you as an entrepreneur, seeking success in a world of rapid change and competing interests. It is also raw and real. Phil and Ian relentlessly pursue solutions and ideas to overcome the most common Human and Online challenges. Letting it all go, they unleash their own vulnerabilities and challenges. As the Human Hackers podcast unfolds it's easy to get los ...
…
continue reading
🔥 This show is tailored for all of you guys that OWN AN ONLINE BUSINESS. I’m going to talk about the basics of growth hacking and work all the way up to complex strategies. I’ll also share some golden nuggets of information that I think will make you guys smarter! 🤓
…
continue reading
Gabriella Coleman, a digital anthropologist most famous for her work with the Hacktivist collective Anonymous, interviews the most influential actors in each era of the evolution of hacking culture from the 1970s to the present day, unveiling how they have moulded the digital world, pop culture and global politics.
…
continue reading
Tune in for actionable insights on business growth, personal development, and expert tips on marketing and advertising. Growth Hackers Radio dives into strategies, hacks, and the latest trends, helping listeners enhance their skills, scale their ventures, and drive meaningful growth. Perfect for entrepreneurs, marketers, and anyone seeking practical advice to boost performance, this radio show is your go-to source for unlocking potential and reaching new heights in both business and personal ...
…
continue reading
A podcast dedicated to the community that is building and using new digital tools for creation. We’re looking at the current palette of artmaking tools online, and taking a critical eye to the history of technology and the internet. We’re interested in where we’ve been and speculative ideas on the future.
…
continue reading
Courtland and Channing Allen interview the ambitious indie hackers who are turning their ideas and side projects into profitable online businesses. Explore the latest strategies and tools founders are using to capitalize on new opportunities, escape the 9-to-5 grind, and create their own personal revenue-generating machines. The future is indie!
…
continue reading
So the big question is this: how are parents like us who didn’t cheat on the FAFSA and who most of us have kids that finished high school as an average student, how are we packaging our kids, researching and selecting schools, and negotiating with colleges to get 50 to 80% off the listed cost of attendance? That was the question and this podcast will give you the answers. My name is Kelly O'Connor and welcome to #collegehackers.
…
continue reading

1
Success Hackers | Empowering Entrepreneurs to Play Bigger in Business and Life
Scott Hansen brings you interviews from some of the most influential Entrepreneurs on the planet
Success Hackers was created to inspire entrepreneurs to reach new heights in their business. If you're looking for strategies, success "hacks", and new ways to double, triple or 10x your business, Success Hackers is the podcast for you. Scott Hansen takes you inside the minds of some of the most talented and successful entrepreneurs who are impacting the world with their message. HACKER NATION!!
…
continue reading
A podcast about cult hacking! Cracking the cult code to understand what they are, how they work, how people leave and how to make sense of the world after leaving. Father and daughter team, media graduate Celine, and former cult member now organizational psychologist Stephen, explore how cults work, why they are so dangerous and the experience of leaving and making sense of the world. They speak to cult hackers from all over the world, from ex members to academics, from writers to filmmakers ...
…
continue reading
A short and to the point podcast about hacking and cyber security. A weekly podcast that give you best information and knowledge about cyber security. And helps you to save your time. Support this podcast: https://podcasters.spotify.com/pod/show/hacker-life/support
…
continue reading
My name is Som Bathla. I’m an Amazon #1 Bestselling Author of 20+ self-improvement books. I’m passionate about personal development and love to help people find their true potential so they can perform to their best and achieve their dreams faster. I’m on a mission to help 10,000 people become authors, so that they could spread their message and boost their brand and impact globally. My core intention is to help people tap into their inner potential and become the best version of themselves.
…
continue reading
Welcome to "The Traffic Hackers" podcast, your go-to resource for mastering the art of lead generation and demand generation. Each episode is packed with insights and strategies to help companies and entrepreneurs skyrocket their business growth. We delve deep into the secrets of increasing sales and revenue, transforming the way you attract and nurture leads. Join us as we explore innovative methods to increase lead sources and reveal the tools and tactics for automating your lead generatio ...
…
continue reading

1
Twitter Spaces Stories. Conversations on AI, Politics, and Society. Adam running for president.
17:57
17:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
17:57Twitter Spaces Stories. Conversations on AI, Politics, and Society. Adam running for president. This podcast transcript features Adam, a presidential candidate, discussing his core values of honesty, truth, and power, while expressing his anti-corruption stance and desire to improve the country. He later engages in a mock interview with an AI, outl…
…
continue reading

1
IA y moda: cómo Zalando innova para inspirar y vender más – con Juan Casero
1:00:01
1:00:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:00:01En este episodio exploramos cómo una de las mayores plataformas de e-commerce en Europa está usando la inteligencia artificial para transformar la experiencia de compra online. Nos acompaña Juan Casero, responsable de comunicación en tecnología en Zalando, quien nos comparte cómo la compañía combina tecnología, datos y valores europeos para liderar…
…
continue reading

1
Mastering Automotive Cybersecurity Compliance: Integrated Strategies - PlaxidityX Ep 25
27:57
27:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:57As cybersecurity regulations tighten across the automotive industry, OEMs and suppliers are under growing pressure to not only build secure vehicles but also prove compliance across their entire software and hardware stack. In this episode of Cars, Hackers, and Cyber Security, we explore the key strategies for mastering compliance with global autom…
…
continue reading
In May 2021, the Colonial Pipeline, the largest refined oil pipeline in the US, was crippled by a ransomware attack exploiting weak VPN security and leaked credentials. The hack led to fuel shortages, panic buying, and a $4.4M ransom payment. Despite partial ransom recovery by the FBI, the incident exposed major gaps in US critical infrastructure c…
…
continue reading
Episode #336 07.10.2025 Quantum and Physicsبقلم Hackers Podcast
…
continue reading

1
Microsoft anuncia demissão de 9 mil funcionários e cancelamento de games; Ataque hacker ao Banco Central pode ter desviado até R$ 800 milhões de reais - Data Hackers News #84
18:32
18:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
18:32Está no ar, o Data Hackers News !! Os assuntos mais quentes da semana, com as principais notícias da área de Dados, IA e Tecnologia, que você também encontra na nossa Newsletter semanal, agora no Podcast do Data Hackers !! Aperte o play e ouça agora, o Data Hackers News dessa semana ! Para saber tudo sobre o que está acontecendo na área de dados, s…
…
continue reading

1
#52 The Ultimate Hacking Wisdom Compilation
26:43
26:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:43This episode marks one year of The Hacker’s Cache. To celebrate, I’ve compiled the most powerful, insightful, and thought-provoking moments from every single episode of Season 1, all 52 of them, in one back-to-back highlight reel. This isn’t just a recap. It’s a front-row seat to the best hot takes, bold opinions, unique insights, and raw truths fr…
…
continue reading
Un fallo eléctrico histórico deja media España a oscuras… pero el debate sigue encendido… Notas y referencias en https://www.tierradehackers.com/episodio-136 Puedes apoyar este Podcast en Patreon y obtener beneficios exclusivos. Además, estarás ayudando a que siga publicándose muchos años más. https://www.tierradehackers.com/patreon/ ⭐️ SPONSORS ⭐️…
…
continue reading
Episodio 59 de Hackers del Marketing En este episodio imperdible de Hackers del Marketing, nos sumergimos en el fascinante mundo de la especialización y clarificación de la oferta de la mano de Diana Parabellum y nuestra invitada Rosy Fragoso de Solo Tazas. **Un agradecimiento especial a nuestro patrocinador, Let’s Work Coworking Industrias @letswo…
…
continue reading

1
TRAILER 2. The DOGE Initiative: An Analysis of Clandestine Intelligence and Public Record on the Compromise of U.S. Federal Systems.
4:57
4:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:57The Anonymous Disclosures: An Analysis of the SURGE-Hill Recordings The foundation of this analysis rests upon two key intelligence disclosures from an operative of the hacktivist collective Anonymous, identified as "SURGE," in conversation with journalist Alberto Daniel Hill. These recordings, while originating from a non-traditional intelligence …
…
continue reading

1
TRAILER: DOGE Initiative Unpacked_ Unlawful Tech, Secret Operations, and the Battle for Government Accountability
4:57
4:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:57This report provides a comprehensive analysis of intelligence disclosed by the Anonymous operative "SURGE," corroborated by an extensive body of public records, court filings, and technical reports. The investigation reveals a coordinated and systematic effort, operating under the banner of the "Department of Government Efficiency" (DOGE), to subve…
…
continue reading

1
Argentina's Shifting Cyber Landscape: From Hacktivism to Financial Crime
54:37
54:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
54:37The provided text offers a comprehensive analysis of Argentina's evolving cybersecurity landscape, tracing its origins from the resourceful "life hacker" culture born out of the 2001 economic crisis to the present day. It highlights a significant shift from ideologically driven hacktivism to financially motivated cybercrime, exemplified by major da…
…
continue reading

1
Latin American Cyber Threats Groups, Individuals, and Trends
51:16
51:16
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
51:16Latin American Cyber Threats Groups, Individuals, and Trends. The provided sources collectively offer a comprehensive overview of the escalating cyber threat landscape in Latin America, highlighting its emergence as a critical region for malicious cyber activity. They explain that this surge in cyber incidents is driven by a combination of rapid di…
…
continue reading

1
LulzSec: Laughing at Your Security Since 2011
23:38
23:38
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
23:38The provided text examines the hacking group LulzSec, detailing their brief but impactful existence in 2011. It highlights their shift from Anonymous due to differing ideologies and their self-proclaimed "gray hat" status, aiming to expose security vulnerabilities and prompt public questioning of data reliance. The source chronicles a series of hig…
…
continue reading

1
Putin's Bears: Russia's Cyber Warfare Tactics
44:24
44:24
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
44:24This source recounts the history of cyberattacks attributed to Russian intelligence agencies, metaphorically referred to as "Putin's bears," detailing their methods and targets. It begins by describing the 2015 Bundestag hack by "Fancy Bear," which stole a significant amount of data from the German Parliament, including Angela Merkel's office. The …
…
continue reading

1
From Imprisonment to Influence_ How One Hacker Built a Media Empire from Injustice
5:12
5:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:12podscan_qozfrBrgLDE4DVEV6kyvlO5grsYmJahr In the sprawling digital landscape, where authenticity is the most coveted currency, few stories are as compelling or as instructive as that of Alberto Daniel Hill. A cybersecurity expert from Uruguay, Hill’s trajectory from a respected professional to an imprisoned hacker, and his subsequent rebirth as a me…
…
continue reading

1
La Tertul-IA #58 GROK 4, Navegadores Agénticos y Robots de Amazon
58:34
58:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
58:34En esta tertulia semanal de Product Hackers, hablamos de los temas más calientes en Inteligencia Artificial. Empezamos con Grok 4, el nuevo modelo de xAI que promete superar a los PhDs en varios benchmarks. ¿Está Elon más cerca que nadie de la AGI? Exploramos el auge de los navegadores agénticos como Comet de Perplexity y DIA, que están reimaginand…
…
continue reading

1
Cybersecurity: Vulnerability, Disclosure, and Responsibility
29:57
29:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:57This conversation revolves around cybersecurity and the vulnerability of various systems, including medical devices and large corporate networks. The speakers discuss the challenges faced by cybersecurity researchers when reporting vulnerabilities to companies, often encountering dismissive responses and a lack of accountability. They highlight the…
…
continue reading
CYBERSECURITY - gatekeepers? Speakers Summary I'll proceed based on assuming that all statements without a clear speaker are being acknowledged by the moderator. - - Key contributions: Speaker 1: - The importance of taking calculated risks to achieve success. - Encouraging people to step out of their comfort zones and try new things. - Sharing expe…
…
continue reading

1
No Money, No Power, No Fame, Just Belief
32:10
32:10
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
32:10This extensive audio transcript captures a lively and often chaotic Twitter Space discussion, revealing a dynamic conversation among several participants, notably Alberto, Charles, K, and Brittany. The core of their discussion revolves around personal anecdotes and challenges, ranging from technological issues like Wi-Fi problems and two-factor aut…
…
continue reading

1
El Burrito Rey: A Digital Odyssey of Connection and Creation
43:12
43:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
43:12El "CYBERMIDNIGHT CLUB" de YouTube presenta un análisis profundo de una conversación de audio social llamada "king burrito.mpp3". Este análisis examina las complejidades de la interacción digital, incluyendo cómo las fallas técnicas afectan la experiencia del usuario y cómo las fallas de comunicación a menudo generan humor. La conversación también …
…
continue reading

1
Extractivismo colonial , LATAM 1
3:44:47
3:44:47
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:44:47Extractivismo colonial , LATAM 1
…
continue reading

1
Operation Bitcoins: Crypto Extortion and Cybercrime- Second part.
45:04
45:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
45:04Operation Bitcoins: Crypto Extortion and Cybercrime- Second part.
…
continue reading

1
Alissa Knight: The World's First Cybersecurity TV Network
31:13
31:13
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
31:13The source provides an interview transcript with Alissa Knight, a cybersecurity expert and entrepreneur, where she discusses her various ventures, primarily the upcoming launch of Knight TV Plus. This new streaming service, launching January 1st, will focus on cybersecurity content, including original series, documentaries, movies, and live broadca…
…
continue reading

1
Operation Bitcoins: Crypto Extortion and Cybercrime
27:12
27:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:12The YouTube channel "CYBERMIDNIGHT CLUB" features an excerpt from the transcript of a police press release describing "Operation Bitcoins" in Uruguay. The operation was initiated after improper entry into a government system, where sensitive information was extracted. The investigation identified a systems engineer linked to one of the IPs, who was…
…
continue reading

1
Ultimate Guide to Cybersecurity and Hacking Podcasts
39:09
39:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:09El texto ofrece una guía exhaustiva sobre el ecosistema de podcasts de ciberseguridad y hacking, describiendo su evolución desde transmisiones técnicas a narrativas sofisticadas. Organiza el contenido en cinco categorías principales: inmersiones narrativas, noticias y análisis semanales, programas técnicos, el elemento humano del engaño y briefings…
…
continue reading

1
Jonathan Scott - Full Episode - We are speaking about YOUR privacy and YOUR #HumanRightsViolated tonight. I will disclose the tools that @Apple has, and show you the truth...
3:13:25
3:13:25
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:13:25We are speaking about YOUR privacy and YOUR #HumanRightsViolated tonight. I will disclose the tools that @Apple has, and show you the truth about what has been going on for a long time. VPN logs, Contacts, Emails, SMS logs, and much more. @jonathandata1 @adanielhill
…
continue reading

1
Data Analysis: Cybermidnight Club Podcast
26:41
26:41
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:41The paper presents an analysis of the performance of a podcast titled "Cybermidnight Club" on Spotify, using Python code and the pandas library to process and clean data from a CSV file. Initially, the characteristics of the data are examined, including the type and number of non-null values in columns such as "Time (UTC)", "Plays", "Streams", "Hou…
…
continue reading

1
De Vigilancia a Ridículo: El Caso Pimentel.
6:17
6:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:17De Vigilancia a Ridículo: El Caso Pimentel . El audio analizado explora la dinámica de un espacio de audio en vivo, inicialmente enfocado en temas críticos sobre México como la ley espía y el caso Pegasus. Sin embargo, la discusión se desvía abruptamente hacia un debate técnico sobre Linux, liderado por un participante llamado Pimentel, cuyas afirm…
…
continue reading

1
Explorando la Dark Web: Ciberseguridad y Peligros Ocultos. Alberto Hill.
22:09
22:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
22:09Explorando la Dark Web: Ciberseguridad y Peligros Ocultos. Alberto Hill. Uruguay's Digital Divide: Navigating Cybersecurity Challenges and Legislative GapsUruguay, often recognized for its advancements in e-government and high internet connectivity, faces significant hurdles in the realm of cybersecurity and the legal prosecution of cybercrimes. De…
…
continue reading

1
Diálogos digitales sin filtros: navegando por la confianza y el engaño en una era conectada
6:18
6:18
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:18Perfiles de los participantes Albert (Anfitrión): Rol: El anfitrión principal y facilitador del espacio, que se esfuerza por lograr una "transparencia radical" y fomentar discusiones sinceras. Fondo: Un "experto en ciberseguridad experimentado" con "décadas de experiencia", incluidas colaboraciones con Interpol. Es conocido como "la primera cárcel …
…
continue reading

1
Unfiltered Digital Dialogues: Navigating Trust and Deception in a Connected Age
59:05
59:05
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
59:05The discussion in X Spaces is presented as a dynamic, personal and intense digital dialogue, focused on the complex relationship between online trust and disappointment. Alberto Daniel Hill, the "architect" and host, is a self-taught cybersecurity professional with decades of experience, including collaborations with Interpol. His credibility is ba…
…
continue reading
3
…
continue reading
2
…
continue reading
1
…
continue reading

1
King Burrito's World Domination Plans
35:58
35:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:58This briefing document summarizes the key themes, ideas, and facts presented in the "King Burrito's Universal Takeover: A Digital Saga" excerpts, primarily drawn from the "kingburrito.mp3" audio recording. The central figure, Alberto (aka "King Burrito"), hosts a dynamic and often chaotic Twitter Space, blending spontaneous musical performances, pe…
…
continue reading

1
A Marriage Fractured: Legal Battles and Digital Deceit
22:43
22:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
22:43In an audio conversation , a woman shares her harrowing divorce experience, detailing how her husband orchestrated a protective order against her, leaving her homeless and without financial support. She describes psychological abuse and controlling tactics, as well as the struggle to maintain custody of her children, suggesting a narrative of manip…
…
continue reading

1
The Hacker or The Hero; The Uruguayan Cyber-Raid That Redefined Justice
6:09
6:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:09The Digital Ghost of Montevideo: The Trials and Triumphs of Alberto Daniel Hill Introduction: The Paradox of the Perfect Target In September 2017, a specialized unit of the Uruguayan police descended upon an apartment in the capital city of Montevideo. Inside, they believed they had discovered the nerve center of a sophisticated cybercriminal. The …
…
continue reading

1
The Enigma of @jonathandata1: An Analytical Profile of Jonathan Scott
6:02
6:02
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:02Jonathan Scott is a mobile security engineer, phone hacker, cloud hacker, and human rights defender who has publicly disclosed significant, deeply embedded vulnerabilities in major mobile operating systems and hardware. He holds a master's degree in computer science and is currently working on his doctorate. Professional Background and Ethical Shif…
…
continue reading

1
From Ethics to Injustice: A Security Expert's Ordeal
34:36
34:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:36This text consists of excerpts from a YouTube video transcript of a presentation by Alberto Daniel Hill at the Ekoparty 2022 security conference. Hill recounts his personal experience of ethically reporting security vulnerabilities in a Uruguayan healthcare system, only to be wrongfully arrested and imprisoned for extortion and fraudulent document …
…
continue reading

1
Hacking Is Not A Crime: A True Story
39:54
39:54
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:54This excerpt from a YouTube video features an interview with Alberto, a self-taught computer engineer from Uruguay who became the first person jailed for cybercrime in his country. The discussion centers on his early hacking experiences at age 12, his responsible disclosure of significant security vulnerabilities to the Uruguayan CERT in 2014 and 2…
…
continue reading

1
The Hacker's Dilemma: Good, Evil, and Justice
4:23
4:23
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:23The YouTube video from "CYBERMIDNIGHT CLUB" discusses the complex relationship between legal cybersecurity professionals and illegal hackers, asserting they often share similar skills, interests, and appearances. The speaker, a security professional, explains that understanding and even embracing hacker culture is essential for effectively combatin…
…
continue reading

1
CyberSPEAKS: A Podcast Audience Deep Dive with Jack Rhysider and Alberto Daniel Hill
4:04
4:04
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:04The "NEW YOUTUBE SOURCE" provides excerpts from a podcast discussion on the "CYBERMIDNIGHT CLUB" YouTube channel, focusing on audience engagement and specific episode content. The host highlights episode download figures, noting that an average episode receives 80,000 to 90,000 downloads, with some reaching 100,000. Alberto, a guest for the current…
…
continue reading

1
Victim of Corruption: An Inside Look at Police Misconduct
44:36
44:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
44:36This YouTube transcript captures a lengthy and emotionally charged conversation involving a person named Alberto, his mother, and others, as they recount Alberto's traumatic experience with the Uruguayan police and Interpol. Alberto details his arrest, interrogation, and subsequent legal battles, highlighting alleged misconduct, theft of his digita…
…
continue reading

1
Marcas con propósito que escalan: comunidad, drops y retail – con Clotsy Brand, Lejan y Maikai Pets
54:58
54:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
54:58¿Qué tienen en común una marca de moda sostenible, una de calzado barefoot infantil y una de snacks naturales para mascotas? Mucho más de lo que parece. En este episodio, reunimos a tres fundadores que están creando auténticas Love Brands desde cero: Ángela Gómez (Clotsy Brand), Raúl Rodríguez (Lejan) y Miriam López (Maikai Pets). 📩 Tips y contenid…
…
continue reading

1
Chasing Edward Snowden: A Whistleblower's Hunt
12:39
12:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
12:39This source documents the international manhunt for Edward Snowden after he leaked classified National Security Agency (NSA) documents. It details the risks Snowden took to meet journalists in Hong Kong, the US government's efforts to apprehend him, and the tense escape attempts with the help of WikiLeaks. The narrative highlights the legal and dip…
…
continue reading
This YouTube documentary transcript provides a comprehensive overview of the hacker group Anonymous, detailing its origins from the 4chan website's "B" board and its evolution from pranks and trolling to significant hactivist operations. The text outlines notable actions such as the takedown of the Church of Scientology's websites, the disruption o…
…
continue reading

1
Hacker Resilience: Ethics, Prison, and Triumph
16:01
16:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
16:01In an extensive dialogue, Alberto Daniel Hill shares his fascinating career as a cybersecurity specialist, detailing his beginnings in programming at an early age and how a juvenile hack of a video game ignited his curiosity. The conversation explores the complexity of cybersecurity, emphasizing the importance of analytical thinking and resilience …
…
continue reading

1
Hacker's Ordeal: A Journey Through Injustice and Recovery
16:01
16:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
16:01This source offers a podcast interview with Alberto Daniel Hill, a computer security expert who was wrongfully imprisoned for eight months in Uruguay due to a misunderstanding of his ethical hacking practices. The discussion highlights the deficiencies in cyber law and the resiliency of the human spirit as Alberto recounts his experience, including…
…
continue reading

1
Persecution of Cybersecurity Researchers and Ethical Hackers
16:03
16:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
16:03The speakers in this source are cybersecurity researchers who are discussing a concerning trend where investigators are being wrongly accused of cybercrimes, particularly in the context of data leaks. They highlight the case of Hiram Alejandro Camarillo, a colleague allegedly accused by Argentina of a false hacking incident. The conversation touche…
…
continue reading