Die CVE-Liste der IT-Schwachstellen steht auf der Kippe, Int. Manuel Atug

Die CVE-Liste der IT-Schwachstellen steht auf...

Up next

Dieser Podcast-Feed wird eingestellt ab dem 1.6.2025

Liebe Hörerinnen und Hörer, der Podast-Feed der Einzelbeiträge von "Computer und Kommunikation" wird in Kürze eingestellt. Alle Folgen der Reihe können Sie weiterhin im Sendsungs-Podcast-Feed von "Computer und Kommunikation" hören. Kloiber, Manfred 

Info-Update 31.5.2025

Haas, Lucian www.deutschlandfunk.de, Computer und Kommunikation 

Recommended Episodes

The Real Superheroes Behind a Supercomputer
Innovation Heroes

The team running Rutgers University’s supercomputer cluster has been busier than ever since the start of the pandemic. Today, they’re supporting the advanced computing needs for over 350 projects for hundreds of users all around the globe. From Dentistry to Astronomy, the work ...

  Show more

How AI is changing national security w/ Kathleen Fisher
The TED AI Show

We’ve had conversations about AI’s online influence on politics, from deepfakes to misinformation. But AI can also have profound effects on hardware – especially when it comes to national security and military capabilities like weapons and stealth technologies. Kathleen Fisher is ...  Show more

3461: AI in Schools and the Cybersecurity Risks Behind It
Tech Talks Daily

What happens when classrooms become laboratories for artificial intelligence? As AI tools find their way into schools, from lesson planning to student assessments, educators and parents are wrestling with how to balance innovation and security.</ ...

  Show more

Notorious Hackers
TechStuff

Cybersecurity company Kaspersky has a list of the most notorious hackers of all time. We look at three of the entries, from the loose confederation of hackers called Anonymous to a hacker responsible for stealing millions of credit and debit card numbers.See omnystudio.com/listen ...  Show more