Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Cybersecurity by josecurity

Technology

Activity Overview

Episode publication activity over the past year

Episodes

Deep Fakes: El Clon Digital que te Roba Identidad y Dinero | Evita Ser la Próxima Víctima

30 Nov 2025

Contributed by Lukas

El podcast explica qué son los Deep Fakes, definiéndolos como contenido audiovisual generado por InteligenciaArtificial que imita la realidad con un...

Conducción autónoma en Europa: Tesla FSD HW4 y sus falsas promesas

22 Oct 2025

Contributed by Lukas

El podcast es un análisis detallado sobre la inminente aprobación del software de Conducción Autónoma Total (FSD) de Tesla en Europa, un hito que ...

Fin de Windows 10: Alternativas Linux Seguras

21 Oct 2025

Contributed by Lukas

El podcast advierte urgentemente a los usuarios de Windows 10 sobre los graves riesgos de seguridad tras el fin de su soporte por parte de Microsoft e...

Redes Sociales: el precio de la vida digital

03 Oct 2025

Contributed by Lukas

El podcast proporciona un exhaustivo resumen sobre los riesgos y la seguridad en las redes sociales (RRSS), plataformas que se han convertido en her...

Guía práctica de privacidad y seguridad online: apps que no pueden faltarte

28 Sep 2025

Contributed by Lukas

El podcast propone una guía práctica de ciberseguridad y privacidad en línea de un artículo escrito por Jose Saiz en josecurity, y se enfoca en re...

¿Proteges bien tus contraseñas? Veamos la solución con gestores de contraseñas y multifactor de autenticación

21 Sep 2025

Contributed by Lukas

El podcast de josecurity se centra en la crucial necesidad de que los usuarios mejoren su higiene de contraseñas y la seguridad de sus cuentas digi...

La magia del navegador Comet de Perplexity. Mi nuevo asistente personal

13 Sep 2025

Contributed by Lukas

El podcast describe una experiencia de primera mano con Comet, un nuevo navegador con inteligencia artificial de Perplexity, que actúa como un asiste...

La independencia tecnológica europea y la transición hacia el software libre

06 Jul 2025

Contributed by Lukas

El podcast subraya la imperativa necesidad de independencia tecnológica en Europa, argumentando que la dependencia actual de empresas y tecnologías ...

Ransomware: cómo reaccionar y mitigar el impacto de esta ciberamenaza

29 Jun 2025

Contributed by Lukas

Este podcast exhaustivo de "Josecurity" aborda la amenaza del ransomware, un tipo de malware que cifra archivos y exige un rescate, generalm...

Mensajería instantánea: iMessage, Facebook, Instagram messenger y la gran mentira de Telegram

21 Jun 2025

Contributed by Lukas

El podcast examina la privacidad y seguridad en las aplicaciones de mensajería instantánea, centrándose principalmente en Telegram. Desvelan que, a...

Tecnología aplicada al deporte: Entrenadores invisibles y gadgets que también salvan vidas

20 Jun 2025

Contributed by Lukas

El podcast "Tecnología aplicada al deporte: Entrenadores invisibles y gadgets que también salvan vidas" explora la evolución de los di...

IA, Desempleo y Renta Básica Universal: Solución Urgente

08 Jun 2025

Contributed by Lukas

El podcast presenta una profunda reflexión sobre el futurodel trabajo ante el avance exponencial de la inteligencia artificial y la automatización. ...

Modo incógnito NO protege tu privacidad [Te explico por qué]

01 Jun 2025

Contributed by Lukas

Este podcast aborda cómo el modo incógnito de losnavegadores no ofrece la privacidad que muchos asumen, explicando que su función principal es ...

Guía práctica para proteger tu email

31 May 2025

Contributed by Lukas

Este podcast titulado "Guía práctica para proteger tu email," ofrece una serie de consejos y estrategias para mejorar la seguridad y priva...

El hombre que susurraba a la IA. Aprende Prompts (modo Dios)

18 May 2025

Contributed by Lukas

El podcast explora la creciente relevancia de la inteligenciaartificial (IA) en la vida cotidiana. Se destaca el rápido avance de las herramientas de...

Energía Nuclear y Cisnes Negros ¿Merece la pena el riesgo?

05 May 2025

Contributed by Lukas

Este podcast que critica la energía nuclear, argumentando que, a pesar de las afirmaciones de ser limpia y económica, presenta riesgos inaceptables ...

Privacidad en la Unión Europea gracias a la GDPR

03 May 2025

Contributed by Lukas

El podcast resalta que en el mundo digital, la información personal semonetiza constantemente, pero en Europa, el Reglamento General deProtección de...

Know the risks and apply these simple tips to protect your email

19 Apr 2025

Contributed by Lukas

This podcast details the security issues inherent to email, such as spam, phishing, and data theft, explaining the various ways email addresses are ob...

Browsers. Protect Your Online Privacy Without Going Paranoid (Part 2)

15 Apr 2025

Contributed by Lukas

This Josecurity.es podcast, titled "Browsers: Protect Your Online Privacy Without Getting Paranoid (Part 2/2)," continues a discussion about...

The most secure messaging apps: Signal, Threema, Briar

12 Apr 2025

Contributed by Lukas

This podcast compares the three most security- and privacy-focused instant messaging apps: Signal, Threema, and Briar.The author explores the features...

Technology for seniors: 11 Tech Gadgets That Save and Improve Lives

27 Mar 2025

Contributed by Lukas

This post explores how various modern technological devices can increase the safety, comfort, and well-being of seniors without replacing personal car...

Browsers: Protect Your Online Privacy Without Going Paranoid

23 Mar 2025

Contributed by Lukas

In this post, Jose Saiz explains how web browserscan compromise users' online privacy through mechanisms such as cookies,fingerprinting, and insec...

Be wary of WhatsApp and learn how to secure the app.

19 Mar 2025

Contributed by Lukas

This podcast warns about the privacy risks associated with WhatsApp, owned by Meta (formerly Facebook), despite its widespread popularity. The author ...

Watch out, lazybones! Protect your privacy by reviewing your software settings

16 Mar 2025

Contributed by Lukas

This podcast by Jose Saiz warns about the dangers of neglecting privacy settings on apps, emphasizing how many companies, whose business model is base...

Risks of Pirated Software

01 Mar 2025

Contributed by Lukas

This podcast examines the risks associated with theuse of pirated software in Spain, where a significant proportion of installed software is unlicense...

Get ready to see AI everywhere. The AI ​​revolution

01 Mar 2025

Contributed by Lukas

This article explores therise of artificial intelligence (AI) and its predicted transformative impact by2027. It analyses how AI is moving from scienc...

Understanding Antivirus Software. How It Works

01 Mar 2025

Contributed by Lukas

Discover how antivirus has evolved into comprehensive cybersecurity solutions. From malware detection to firewall protection, they have transformed in...

How China already dominates the technologies that will change your life

20 Feb 2025

Contributed by Lukas

The podcast looks at China's rise as a technological powerhouse. It focuses on its dominance in areas such as artificial intelligence, electric ca...

Spain's Order TDF/149/2025: Combatting Vishing and Smishing

20 Feb 2025

Contributed by Lukas

This podcast details the growing threats of phone and text scams, known as vishing and smishing, respectively, and how scammers use social engineering...

Human error in cybersecurity: understanding and mitigation

15 Feb 2025

Contributed by Lukas

The podcast explores human error as the main vulnerability in cybersecurity. It identifies two main types of errors: skill-based and knowledge-based.T...

Cybercriminals Uncovered: OSINT Tools and Operation

09 Feb 2025

Contributed by Lukas

This podcast explores the tactics of cybercriminals, with an emphasis on their use of OSINT tools to gather information about their targets. It descri...

Cybercrime vs. Big Tech: Who is the threat?

08 Feb 2025

Contributed by Lukas

The podcast examines the landscape of threats in cyberspace, contrasting the activities of cybercriminals with those of large technology corporations ...

USA or China - why not both? The future of AI depends on global collaboration

01 Feb 2025

Contributed by Lukas

The article analyses the rapid advancement of artificial intelligence, exemplified by the emergence of tools such as DeepSeek and Qwen. The exponenti...

Infection vectors and infrastructures hackers use to attack you

25 Jan 2025

Contributed by Lukas

The podcast describes a variety of ways hackers infect systems. Infection vectors such as malware disguised as legitimate software, malicious websites...

Data as Commodity: How Tech Giants Profit from Your Privacy

13 Jan 2025

Contributed by Lukas

The podcast argues that platforms such as Google and Facebook build their fortunes using users' personal data as raw material. It explains how these c...

5 Phases of Hacker Attack

31 Dec 2024

Contributed by Lukas

The podcast describes the five phases of a cyberattack: 1. Information gathering, using techniques such as footprinting and fingerprinting to profile...

Don’t Let Hackers and Scammers win: we can stop them

27 Dec 2024

Contributed by Lukas

The podcast features a series of articles on cybersecurity, focused on educating readers about common hackers and scammers tactics. Different types of...

Josecurity podcast presentation

12 Nov 2024

Contributed by Lukas

Welcome to Our Cybersecurity Podcast – Made for Everyone! Unlock the secrets to staying secure online with our accessible and engaging episodes. We ...