Cybersecurity by josecurity
Episodes
Deep Fakes: El Clon Digital que te Roba Identidad y Dinero | Evita Ser la Próxima Víctima
30 Nov 2025
Contributed by Lukas
El podcast explica qué son los Deep Fakes, definiéndolos como contenido audiovisual generado por InteligenciaArtificial que imita la realidad con un...
Conducción autónoma en Europa: Tesla FSD HW4 y sus falsas promesas
22 Oct 2025
Contributed by Lukas
El podcast es un análisis detallado sobre la inminente aprobación del software de Conducción Autónoma Total (FSD) de Tesla en Europa, un hito que ...
Fin de Windows 10: Alternativas Linux Seguras
21 Oct 2025
Contributed by Lukas
El podcast advierte urgentemente a los usuarios de Windows 10 sobre los graves riesgos de seguridad tras el fin de su soporte por parte de Microsoft e...
Redes Sociales: el precio de la vida digital
03 Oct 2025
Contributed by Lukas
El podcast proporciona un exhaustivo resumen sobre los riesgos y la seguridad en las redes sociales (RRSS), plataformas que se han convertido en her...
Guía práctica de privacidad y seguridad online: apps que no pueden faltarte
28 Sep 2025
Contributed by Lukas
El podcast propone una guía práctica de ciberseguridad y privacidad en línea de un artículo escrito por Jose Saiz en josecurity, y se enfoca en re...
¿Proteges bien tus contraseñas? Veamos la solución con gestores de contraseñas y multifactor de autenticación
21 Sep 2025
Contributed by Lukas
El podcast de josecurity se centra en la crucial necesidad de que los usuarios mejoren su higiene de contraseñas y la seguridad de sus cuentas digi...
La magia del navegador Comet de Perplexity. Mi nuevo asistente personal
13 Sep 2025
Contributed by Lukas
El podcast describe una experiencia de primera mano con Comet, un nuevo navegador con inteligencia artificial de Perplexity, que actúa como un asiste...
La independencia tecnológica europea y la transición hacia el software libre
06 Jul 2025
Contributed by Lukas
El podcast subraya la imperativa necesidad de independencia tecnológica en Europa, argumentando que la dependencia actual de empresas y tecnologías ...
Ransomware: cómo reaccionar y mitigar el impacto de esta ciberamenaza
29 Jun 2025
Contributed by Lukas
Este podcast exhaustivo de "Josecurity" aborda la amenaza del ransomware, un tipo de malware que cifra archivos y exige un rescate, generalm...
Mensajería instantánea: iMessage, Facebook, Instagram messenger y la gran mentira de Telegram
21 Jun 2025
Contributed by Lukas
El podcast examina la privacidad y seguridad en las aplicaciones de mensajería instantánea, centrándose principalmente en Telegram. Desvelan que, a...
Tecnología aplicada al deporte: Entrenadores invisibles y gadgets que también salvan vidas
20 Jun 2025
Contributed by Lukas
El podcast "Tecnología aplicada al deporte: Entrenadores invisibles y gadgets que también salvan vidas" explora la evolución de los di...
IA, Desempleo y Renta Básica Universal: Solución Urgente
08 Jun 2025
Contributed by Lukas
El podcast presenta una profunda reflexión sobre el futurodel trabajo ante el avance exponencial de la inteligencia artificial y la automatización. ...
Modo incógnito NO protege tu privacidad [Te explico por qué]
01 Jun 2025
Contributed by Lukas
Este podcast aborda cómo el modo incógnito de losnavegadores no ofrece la privacidad que muchos asumen, explicando que su función principal es ...
Guía práctica para proteger tu email
31 May 2025
Contributed by Lukas
Este podcast titulado "Guía práctica para proteger tu email," ofrece una serie de consejos y estrategias para mejorar la seguridad y priva...
El hombre que susurraba a la IA. Aprende Prompts (modo Dios)
18 May 2025
Contributed by Lukas
El podcast explora la creciente relevancia de la inteligenciaartificial (IA) en la vida cotidiana. Se destaca el rápido avance de las herramientas de...
Energía Nuclear y Cisnes Negros ¿Merece la pena el riesgo?
05 May 2025
Contributed by Lukas
Este podcast que critica la energía nuclear, argumentando que, a pesar de las afirmaciones de ser limpia y económica, presenta riesgos inaceptables ...
Privacidad en la Unión Europea gracias a la GDPR
03 May 2025
Contributed by Lukas
El podcast resalta que en el mundo digital, la información personal semonetiza constantemente, pero en Europa, el Reglamento General deProtección de...
Know the risks and apply these simple tips to protect your email
19 Apr 2025
Contributed by Lukas
This podcast details the security issues inherent to email, such as spam, phishing, and data theft, explaining the various ways email addresses are ob...
Browsers. Protect Your Online Privacy Without Going Paranoid (Part 2)
15 Apr 2025
Contributed by Lukas
This Josecurity.es podcast, titled "Browsers: Protect Your Online Privacy Without Getting Paranoid (Part 2/2)," continues a discussion about...
The most secure messaging apps: Signal, Threema, Briar
12 Apr 2025
Contributed by Lukas
This podcast compares the three most security- and privacy-focused instant messaging apps: Signal, Threema, and Briar.The author explores the features...
Technology for seniors: 11 Tech Gadgets That Save and Improve Lives
27 Mar 2025
Contributed by Lukas
This post explores how various modern technological devices can increase the safety, comfort, and well-being of seniors without replacing personal car...
Browsers: Protect Your Online Privacy Without Going Paranoid
23 Mar 2025
Contributed by Lukas
In this post, Jose Saiz explains how web browserscan compromise users' online privacy through mechanisms such as cookies,fingerprinting, and insec...
Be wary of WhatsApp and learn how to secure the app.
19 Mar 2025
Contributed by Lukas
This podcast warns about the privacy risks associated with WhatsApp, owned by Meta (formerly Facebook), despite its widespread popularity. The author ...
Watch out, lazybones! Protect your privacy by reviewing your software settings
16 Mar 2025
Contributed by Lukas
This podcast by Jose Saiz warns about the dangers of neglecting privacy settings on apps, emphasizing how many companies, whose business model is base...
Risks of Pirated Software
01 Mar 2025
Contributed by Lukas
This podcast examines the risks associated with theuse of pirated software in Spain, where a significant proportion of installed software is unlicense...
Get ready to see AI everywhere. The AI revolution
01 Mar 2025
Contributed by Lukas
This article explores therise of artificial intelligence (AI) and its predicted transformative impact by2027. It analyses how AI is moving from scienc...
Understanding Antivirus Software. How It Works
01 Mar 2025
Contributed by Lukas
Discover how antivirus has evolved into comprehensive cybersecurity solutions. From malware detection to firewall protection, they have transformed in...
How China already dominates the technologies that will change your life
20 Feb 2025
Contributed by Lukas
The podcast looks at China's rise as a technological powerhouse. It focuses on its dominance in areas such as artificial intelligence, electric ca...
Spain's Order TDF/149/2025: Combatting Vishing and Smishing
20 Feb 2025
Contributed by Lukas
This podcast details the growing threats of phone and text scams, known as vishing and smishing, respectively, and how scammers use social engineering...
Human error in cybersecurity: understanding and mitigation
15 Feb 2025
Contributed by Lukas
The podcast explores human error as the main vulnerability in cybersecurity. It identifies two main types of errors: skill-based and knowledge-based.T...
Cybercriminals Uncovered: OSINT Tools and Operation
09 Feb 2025
Contributed by Lukas
This podcast explores the tactics of cybercriminals, with an emphasis on their use of OSINT tools to gather information about their targets. It descri...
Cybercrime vs. Big Tech: Who is the threat?
08 Feb 2025
Contributed by Lukas
The podcast examines the landscape of threats in cyberspace, contrasting the activities of cybercriminals with those of large technology corporations ...
USA or China - why not both? The future of AI depends on global collaboration
01 Feb 2025
Contributed by Lukas
The article analyses the rapid advancement of artificial intelligence, exemplified by the emergence of tools such as DeepSeek and Qwen. The exponenti...
Infection vectors and infrastructures hackers use to attack you
25 Jan 2025
Contributed by Lukas
The podcast describes a variety of ways hackers infect systems. Infection vectors such as malware disguised as legitimate software, malicious websites...
Data as Commodity: How Tech Giants Profit from Your Privacy
13 Jan 2025
Contributed by Lukas
The podcast argues that platforms such as Google and Facebook build their fortunes using users' personal data as raw material. It explains how these c...
5 Phases of Hacker Attack
31 Dec 2024
Contributed by Lukas
The podcast describes the five phases of a cyberattack: 1. Information gathering, using techniques such as footprinting and fingerprinting to profile...
Don’t Let Hackers and Scammers win: we can stop them
27 Dec 2024
Contributed by Lukas
The podcast features a series of articles on cybersecurity, focused on educating readers about common hackers and scammers tactics. Different types of...
Josecurity podcast presentation
12 Nov 2024
Contributed by Lukas
Welcome to Our Cybersecurity Podcast – Made for Everyone! Unlock the secrets to staying secure online with our accessible and engaging episodes. We ...