POPULARITY
Willkommen zum SKYTALE-Podcast Ausgabe 59. Nachdem wir uns in der letzten Folge in einem Special ausschließlich um die neue Elektronische Patientenakte mit all ihren Vorteilen und Fehlern unterhalten hatten, wollen wir uns heute wieder mal den ganz profanen Betrügereien, Bedrohungen und alten und neuen kriminelle Maschen in der IT- und Kommunikations-Sicherheit widmen. Heute geht es unter anderem um die Polizei und andere Ordnungs- und Sicherheitsbehörden, um Online-Datei-Konverter und Keylogger, um WLAN-Kameras in Unternehmen und um Carla Columna. Die Links zum Podcast: Alle SKYTALE-Podcasts Der Fakeshop-Finder der Verbraucherzentrale Malwarebytes zu betrügerischen Datei-Konvertern Verbraucherzentrale NRW zu Fakeshops im Frühjahr Folge direkt herunterladen
Please enjoy this encore episode of Word Notes. Software or hardware that records the computer keys pressed by a user.
Please enjoy this encore episode of Word Notes. Software or hardware that records the computer keys pressed by a user. Learn more about your ad choices. Visit megaphone.fm/adchoices
Deze week in Dasprive: Staan even stil bij de privacy professional of the year verkiezing via de Cyber Security Coalition. Microsoft dacht even te scoren met een vette nieuwe feature in Windows 11 na alle negatieve pers van de afgelopen tijd… en daar heeft men zich flink mispakt. Google heeft een interne database met alle… Continue reading 165 – Microsoft Keylogger, Google incidenten en chillen met Nippy
This is a recap of the top 10 posts on Hacker News on June 9th, 2024.This podcast was generated by wondercraft.ai(00:33): Piku: Allows git push deployments to your own serversOriginal post: https://news.ycombinator.com/item?id=40622704&utm_source=wondercraft_ai(02:03): Economic Termites: Monopolies not noticeable enough for most of usOriginal post: https://news.ycombinator.com/item?id=40623843&utm_source=wondercraft_ai(03:39): Designing a Lego orreryOriginal post: https://news.ycombinator.com/item?id=40626807&utm_source=wondercraft_ai(05:11): The Weird Nerd comes with trade-offsOriginal post: https://news.ycombinator.com/item?id=40624924&utm_source=wondercraft_ai(07:02): Keylogger discovered in image generator extensionOriginal post: https://news.ycombinator.com/item?id=40626014&utm_source=wondercraft_ai(08:39): Ultrasonic investigations in shopping centresOriginal post: https://news.ycombinator.com/item?id=40624709&utm_source=wondercraft_ai(10:17): A ChatGPT mistake cost us $10kOriginal post: https://news.ycombinator.com/item?id=40627558&utm_source=wondercraft_ai(12:08): Woman set up a table to share her collection of washers. Nothing was for saleOriginal post: https://news.ycombinator.com/item?id=40627522&utm_source=wondercraft_ai(13:31): Libtree: Ldd as a tree saying why a library is found or notOriginal post: https://news.ycombinator.com/item?id=40626969&utm_source=wondercraft_ai(15:04): A Revolution in Biology?Original post: https://news.ycombinator.com/item?id=40626332&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Big Tech, Fighting a Junta, Keylogger in Microsoft , APT Hackers, Free Laundry, Joshua Marpet & more on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-388
Big Tech, Fighting a Junta, Keylogger in Microsoft , APT Hackers, Free Laundry, Joshua Marpet & more on this edition of the Security Weekly News! Show Notes: https://securityweekly.com/swn-388
Big Tech, Fighting a Junta, Keylogger in Microsoft , APT Hackers, Free Laundry, Joshua Marpet & more on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-388
Big Tech, Fighting a Junta, Keylogger in Microsoft , APT Hackers, Free Laundry, Joshua Marpet & more on this edition of the Security Weekly News! Show Notes: https://securityweekly.com/swn-388
Think your phone's being watched? Here's how to find out.
1. What We Do gKb 2. Art Quake6. oSwick 3.Everything. Hexa 4.Chosen 2. oSwick 5.Keylogger. Gie Hayford 6.Ten Tens. oSwick 7.Magic. oSwick 8.Beautiful Lies. B–Complex 9.Green Light. oSwick 10.2MakeU. oSwick 11.Progress. Dat Garcia, Diezmo, Y–Zer 12.Lonely. oSwick 13.What Am I Gie Hayford 14.Every Time I Hear Dj Rap the music 15.Dance in the Rain. Sola Jfal [Conrad Subs remix]
You can subscribe to the Really Useful Podcast on Apple Podcasts, Spotify, Google Podcasts, Amazon Music and Audible, Player FM, or copy the RSS feed into your podcast player.This week, we chat about the following tech news that matters: MiniDisc Connected to Nintendo Wii U Proton VPN Launches Browser Extension Acronis Denies Large Data Breach We've got these tips and explainers: What Is Snake Keylogger? How to Change Your Email Address There Is No ChatGPT Windows Client We finish the show with the following recommendations: Firewalla Purple SE Final ZE8000 earbuds Christian Cawley and Gavin Phillips host this podcast. You can contact them on Twitter: @thegadgetmonkey and @gavinspavin, with your suggestions for future topics.
Kapitoly: 00:00 Úvod 00:34 NÚKIB varuje před TikTokem 01:46 Inženýr LastPassu neaktualizoval svůj mediální software 03:54 XLL soubory jsou blokovány ve výchozím nastavení 04:22 Xenomorph malware cílí na zákazníky 400 bankovních institucí v Evropě 07:07 Ransomware zastavil provoz nemocnice ve Španělsku 08:17 WhatsApp odmítá zrušit e2e šifrování v UK 09:37 Meme Of The Week Sledujte nás na Twitteru: https://twitter.com/AlefSecurity
A wormable version of the PlugX USB malware is found. Compromised webcams as a security threat. Emotet botnet out of hibernation. Proof-of-concept: AI used to generate polymorphic keylogger. Turning to alternatives as conventional tactics fail. Dave Bittner speaks with Eve Maler of ForgeRock to discuss how digital identity can help create a more secure connected car experience. Johannes Ullrich from SANS on configuring a proper time server infrastructure. And Phishing messages via legitimate Google notifications. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/46 Selected reading. A border-hopping PlugX USB worm takes its act on the road (Sophos News) BitSight identifies thousands of global organizations using insecure webcams and other IoT devices, finding many susceptible to eavesdropping (BitSight) Emotet malware attacks return after three-month break (BleepingComputer) BlackMamba: Using AI to Generate Polymorphic Malware (HYAS) Russian Cyberwar in Ukraine Stumbles Just Like Conventional One (Bloomberg) Australian official demands Russia bring criminal hackers ‘to heel' (The Record by Recorded Future) Russia will have to rely on nukes, cyberattacks, and China since its military is being thrashed in Ukraine, US intel director says (Business Insider) BEC 3.0 - Legitimate Sites for Illegitimate Purposes (Avanan)
Schon unter 20 Euro bekommt man ein Hacking-Gadget, die interessanten kosten um 100 Euro. Im Podcast c't uplink stellen wir einige vor und beschreiben, welche vielen verschiedenen Arten von Hacks und Tricks sie beherrschen. Auch die rechtliche Seite kommt zur Sprache: Was darf ich besitzen, was darf ich anwenden, was darf ich für Pentests beispielsweise in der eigenen Firma ausprobieren? Die dazu passende Titelgeschichte "Hacking-Gadgets" erscheint in c't 5/2023. Als Gäste im Podcast-Studio sind dabei: Ronald Eikenberg, Autor der Titelgeschichte, Tobias Scheible, Sicherheitsforscher mit besonderem Faible für die angriffslustigen Geräte und Joerg Heidrich, Datenschutzbeauftragter und Justiziar des Heise Verlags. https://www.heise.de/select/ct/2023/5 Einige der Gadgets ermöglichen einen Angriff aufs WLAN von außen, indem sie auf Knopfdruck alle angemeldeten Geräte aus dem WLAN werfen und dazu bringen, sich an einem Fake-Router anzumelden. Wir erwähnen Tipps, wie man sein WLAN gegen solche Angriffe schützt. Andere Gadgets hören auf beispielsweise von Smart-Home-Geräten genutzten Frequenzen mit -- klingt nach einem harmlosen Mitlesen des Thermometers des Nachbarn, aber ermöglicht Bewegungsprofile von den Fahrzeugen zu erstellen, deren Reifenventile per Funk vor Platten warnen. Eine große Gefahr geht von den Hacking-Gadgets aus, die Angreifer an einen PC anschließen: Die Kästchen tarnen sich als USB-Sticks oder LAN-Adapter und sind in der Lage, Daten zu klauen, Passwörter mitzulesen oder den gesamten PC zu übernehmen. Andere zerstören den PC einfach. Wir zeigen einige Modelle, erklären deren Möglichkeiten und entwerfen Schutzmaßnahmen. Der wohl wichtigste Schutz ist, die Mitarbeiter zu sensibilisieren: Eines der gefährlichsten Gadgets, das Tastatureingaben mitliest und per WLAN verschickt, könnten auch wir nicht von einem harmlosen USB-Kabel unterscheiden. Wichtig ist auch, bestehende Sicherheitsstandards zu implementieren: Ein Hacking-Gadget kopiert RFID-Karten, die vielerorts als Zugangsschutz dienen -- und das gelingt nur, wenn der Ausgeber der Karten einige schützende Maßnahmen vergisst. Wir haben das direkt mit der Heise-Zugangskarte ausprobiert -- puh, glücklicherweise ließ sie sich nicht kopieren. Ein weiteres Gadget zeigt, ob der NFC-Chip beim Smartphone wirklich ausgeschaltet ist. Mit dabei: Ronald Eikenberg, Joerg Heidrich und Tobias Scheible
Plus, Kia and Hyundai's important update to stop car theft. How mail trucks are mapping cell networks all over the nation. And rent your extra space out for some extra cash. Learn more about your ad choices. Visit megaphone.fm/adchoices
Plus, Kia and Hyundai's important update to stop car theft. How mail trucks are mapping cell networks all over the nation. And rent your extra space out for some extra cash. Learn more about your ad choices. Visit megaphone.fm/adchoices
Plus, Kia and Hyundai's important update to stop car theft. How mail trucks are mapping cell networks all over the nation. And rent your extra space out for some extra cash. Learn more about your ad choices. Visit megaphone.fm/adchoices
Plus, Kia and Hyundai's important update to stop car theft. How mail trucks are mapping cell networks all over the nation. And rent your extra space out for some extra cash. Learn more about your ad choices. Visit megaphone.fm/adchoices
Plus, I was in the pool when a spy drone hung out in my yard. I'll tell you what to do if this happens to you. You don't have to waste money on Microsoft Office, get out of people search sites, and the best way to get internet off the grid. Learn more about your ad choices. Visit megaphone.fm/adchoices
Plus, I was in the pool when a spy drone hung out in my yard. I'll tell you what to do if this happens to you. You don't have to waste money on Microsoft Office, get out of people search sites, and the best way to get internet off the grid. Learn more about your ad choices. Visit megaphone.fm/adchoices
Plus, I was in the pool when a spy drone hung out in my yard. I'll tell you what to do if this happens to you. You don't have to waste money on Microsoft Office, get out of people search sites, and the best way to get internet off the grid. Learn more about your ad choices. Visit megaphone.fm/adchoices
Sponsor by SEC Playground แบบสอบถามเพื่อปรับปรุง Chill Chill Security Channel: https://forms.gle/e5K396JAox2rZFp19 --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
Sponsor by SEC Playground แบบสอบถามเพื่อปรับปรุง Chill Chill Security Channel: https://forms.gle/e5K396JAox2rZFp19 --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
Relationship Reddit Stories, OP is suspicious of his wife after a strong gut feeling, he checked her phones and founds some strange messages from a recent concert she attended. He decides to install a keylogger on her computer to find out more.
Sponsor by SEC Playground แบบสอบถามเพื่อปรับปรุง Chill Chill Security Channel: https://forms.gle/e5K396JAox2rZFp19 --- Support this podcast: https://anchor.fm/chillchillsecurity/support
Nesse episódio trouxemos as notícias e novidades do mundo da programação que nos chamaram atenção dos dias 13/08 a 19/08! Breakpoint: Nessa semana o tema foi: “Gabriel pegou um projeto impossível de executar quando era dev júnior". Hosts: Somos Gabriel Fróes e Vanessa Weber, um casal de programadores que dá as caras desde 2016 no canal Código Fonte TV no YouTube. Links: Receba as Notícias do Compilado no Email: compilado.codigofonte.com.br Assista o Compilado no YouTube: codft.me/canalcompilado Esse é o momento ideal de pegar um café e se atualizar com notícias sobre programação que nos chamaram a atenção essa semana.
Nesse episódio trouxemos as notícias e novidades do mundo da programação que nos chamaram atenção dos dias 13/08 a 19/08! Breakpoint: Nessa semana o tema foi: “Gabriel pegou um projeto impossível de executar quando era dev júnior". Hosts: Somos Gabriel Fróes e Vanessa Weber, um casal de programadores que dá as caras desde 2016 no canal Código Fonte TV no YouTube. Links: Receba as Notícias do Compilado no Email: compilado.codigofonte.com.br Assista o Compilado no YouTube: codft.me/canalcompilado Esse é o momento ideal de pegar um café e se atualizar com notícias sobre programação que nos chamaram a atenção essa semana.
They discuss an article that highlights the practice of keylogging web page entry fields before you hit submit. Over that they smoke the Henry Clay War Hawk with Don Sergio 100% Blue Agave Reposado. Some tequila stories occur and they wrap it up with suggested cautions. https://www.wired.com/story/leaky-forms-keyloggers-meta-tiktok-pixel-study/
Kontynuujemy specjalną edycję naszego podcastu w nowej formule codziennych raportów. Od poniedziałku do piątku relacjonujemy dla Was najważniejsze wydarzenia z zakresu działań podejmowanych w cyberprzestrzeni. Dzisiejszy odcinek poprowadziła Ewa Matusiak. Dzisiejsze tematy: DuckDuckGo umożliwia śledzenie trackerom Microsofta Hakerzy atakują rosyjski rząd za pomocą fałszywych aktualizacji systemu Windows CISA dodaje 41 luk do swojej listy Keylogger More
Darf der Arbeitgeber Arbeitnehmer mittels IT-Systemen überwachen? Wo liegen die rechtlichen Grenzen einer Mitarbeiterüberwachung? Darum geht es in dieser Episode.
Mit diversen Programmen könnten Arbeitgeber überprüfen, ob ihre Angestellten im Homeoffice am PC arbeiten. Legal sind nicht alle davon. Angestellte sind der Überwachung aber nicht schutzlos ausgeliefert.
Is someone tracking every letter you type into your phone? Listen now for a few ways to find out. Learn more about your ad choices. Visit megaphone.fm/adchoices
Is someone tracking every letter you type into your phone? Listen now for a few ways to find out. Learn more about your ad choices. Visit megaphone.fm/adchoices
Python keylogger bypasses Windows 11 Defender // Convert WIFI py to EXE Learn how to convert your Python code to run as an EXE on Windows 11. The code will run on Windows without Python installed. So, you think you need Python installed to run Python code on Windows 11? Well, think again. You also think that Windows 11 real time protection will protect you against malicious code? Well think again! Warning: Don't download software that you don't trust. Only download software from reputable software developers and those you trust. // MENU // 0:00 ▶️ Introduction: Warning 2:03 ▶️ Windows 11 setup: Python not installed, Windows version, anti-virus 3:12 ▶️ Demo of python code running on Windows 11: 5:42 ▶️ Demo of WiFi code 6:47 ▶️ Nuitka installation steps 10:27 ▶️ Compile Python code 13:52 ▶️ Run compiled code on Windows 11 14:25 ▶️ Be aware of Python requirements that you need to install // SCRIPTS // Python key: https://davidbombal.wiki/pythonkeys Python WiFi: https://davidbombal.wiki/pythonwifi // PDF Instructions// Download here: https://davidbombal.wiki/pythoncompile // SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com python py to exe py exe python py to exe python exe compile python python compile python exe python convert to exe python convert py to exe python py exe python code windows windows 11 windows 10 anti virus real time protection windows anti virus windows real time protection windows 11 protection windows 11 python python compile compile python code compile python python windows windows python nuitka nuitka python nuitka windows 11 windows 11 exe nuitka compile Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #python #keylogger #wifi
Eddy der InfoSec Frosch - Der kinderleichte Cyber Awareness Podcast
Eddy räumt mit einigen Mythen über Antivirenschutzprogramme und PC-Optimierungssoftware auf und erklärt dir, wie du deine Kollegen einfach mit Windows Boardmitteln ausspionieren kannst oder wie du sie davor schützt. Schalte ein! Eddys Tipps von Montag bis Freitag auf Twitter und jeden Sonntag als Podcast. Eddy auf Twitter: https://twitter.com/eddy_infosec
It's just crazy scary what these cables can do. They look like normal USB cables, but are not! In this video we login to Apple MacOS and Linux computers :) ====== Scripts: ====== Apple macOS Rickroll: https://davidbombal.wiki/applerickroll Linux Rickroll: https://davidbombal.wiki/linuxrickroll ======================= Buy Hak5 coolness here: ======================= Buy Hak5: https://davidbombal.wiki/gethak5 ================================ Hacking Android and iOS devices: ================================ OMG with Android and Apple iPad: https://youtu.be/7YpJQT55_Y8 ============= Setup Videos: ============= OMG Cable setup: https://youtu.be/V5mBJHotZv0Hak5 Rubber Ducky setup: https://youtu.be/A2JNBpUotZM ================ Connect with me: ================ Discord: https://discord.com/invite/usKSyzbTwi... https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombalYouTube: https://www.youtube.com/davidbombal keylogger keylogging key logger hak5 keylogger macos keylogger hak5 omg cables omg cable apple apple macos linux ubuntu ubuntu hack linux hack rubber ducky hak5 rubber ducky hak5 omg cable omg cable android omg cable ios Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #omgcable #hak5 #rubberducky
Software or hardware that records the computer keys pressed by a user.
Software or hardware that records the computer keys pressed by a user.
Ce 11e episode est consacré au logiciel espion que pourrait utiliser certaines entreprises pour surveiller ses salariés en télétravail. La pandémie de COVID a largement bouleversé les conditions de travail et on assiste à un recours massif du télétravail. L' effet néfaste de cette révolution, est l'augmentation de pratiques de surveillance des salariés en télétravail par le biais de logiciel espion que mettrait en place certaines entreprises. Cette pratique est très répandue aux Etats-Unis, néanmoins, si elle fait son apparition en France, elle demeure très encadrée. En effet, la CNIL pose des règles très claires permettant au dispositif de contrôle d'être proportionné à l'objectif poursuivi et respectueux des droits et libertés des salariés. Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.
Be careful of where you type your password! Keyloggers can log all your keystrokes. Learn Python by having some fun :) This video is part of the FREE Security+ course covering the SY0-501 AND SY0-601 exams. Need help? Join my Discord: https://discord.com/invite/usKSyzb Get the code here: https://bit.ly/pythonkeys ================ Connect with me: ================ Discord: http://discord.davidbombal.com Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/davidbombal ================ Support me: ================ Join thisisIT: https://bit.ly/thisisitccna Or, buy my CCNA course and support me: DavidBombal.com: CCNA ($10): http://bit.ly/yt999ccna Udemy CCNA Course: https://bit.ly/ccnafor10dollars GNS3 CCNA Course: CCNA ($10): https://bit.ly/gns3ccna10 ====================== Special Offers: ====================== Cisco Press: Up to 50% discount Save every day on Cisco Press learning products! Use discount code BOMBAL during checkout to save 35% on print books (plus free shipping in the U.S.), 45% on eBooks, and 50% on video courses and simulator software. Offer expires December 31, 2020. Shop now. Link: bit.ly/ciscopress50 ITPro.TV: https://itpro.tv/davidbombal 30% discount off all plans Code: DAVIDBOMBAL Boson software: 15% discount Link: bit.ly/boson15 Code: DBAF15P comptia comptia security+ security+ python ethical hacking key logging keylogger python key logger python scripts cyber security Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Op. GUNMAN & The World's First KeyloggerAdvertising Inquiries: https://redcircle.com/brands
In 1983, the US got word that an ally's embassy - probably France's - was bugged by the Soviets. This reports triggered Operation GUNMAN: a complete removal & de-bugging of *all* electronic devices in the US embassy in the USSR. This secretive operation resulted in a surprising discovery - and made the NSA what it is today.
Georgia's elections infrastructure had been hacked multiple times since 2014 - both by Russian Intelligence and local White Hat hackers. The upcoming elections are plagued with uncertainty - and uncertainty and democracy go together like wet hands and electrical outlets. The post Op. GUNMAN & The World’s First Keylogger appeared first on Malicious Life.
Esse site denuncia torrents que você anda baixando (e de seus amigos também). Tem até uma muquiranagem própria ver ver os torrents do amiguinho. 4 VPN’s em promoção com acesso para a vida toda e que permitem torrent, vou começar com a minha preferida: – FastestVPN, essa é a que eu uso para mais de …
This week Mike and Tara discuss net neutrality, a fake version of AdBlock Pro, an HP driver which hides a keylogger, and more.
This week, a global ransomware hack will make you WannaCry, Google's I/O Conference, babies made from skin cells, Apple builds a new new spaceship & a pizza box, plus much, much more. What We're Playing With Dwayne: Boulder Startup Week Headlines HP is shipping audio drivers with a built-in keylogger WannaCry ransomware: Everything you need to know Massive ransomware infection hits computers in 99 countries Microsoft president blasts NSA for its role in 'WannaCry' computer ransom attack Cybersecurity shares surge as WannaCry ransomware continues to wreak havoc Audible Book of the Week The Girl with All the Gifts by M.R. Carey Sign up at AudibleTrial.com/TheDrillDown Music Break: Cry by Godley and Creme Hot Topic: Google I/O 2017 The 10 biggest announcements from Google I/O 2017 Android surpasses 2 BN devices Google Assistant can see & understand the world around you Google Assistant on iPhone Google Home turns into a phone Home gets way more useful Google Photos adds books & effortless sharing Standalone VR helmets are coming Android O beta is available Android Go Tensor Processing Unit AI Chip Google Wants Android and Its Assistant to Power Your Car Too Music Break: I've Got You Under My Skin by Frank Sinatra Final Word Apple's New Campus: An Exclusive Look Inside the Mothership Apple patented a pizza box, for pizzas Babies From Skin Cells? Prospect Is Unsettling to Some Experts The Drill Down Videos of the Week Saturday Night Live: Amazon Echo Silver Star Trek: Discovery - First Look Trailer Subscribe! The Drill Down on iTunes (Subscribe now!) Add us on Stitcher! The Drill Down on Facebook The Drill Down on Twitter Geeks Of Doom's The Drill Down is a roundtable-style audio podcast where we discuss the most important issues of the week, in tech and on the web and how they affect us all. Hosts are Geeks of Doom contributor Andrew Sorcini (Mr. BabyMan), marketing research analyst Dwayne De Freitas, and Box product manager Tosin Onafowokan.