Channel Avatar

Security Researcher @UCLiddPJ0bQuCulSAsDN1QvQ@youtube.com

47K subscribers - no pronouns :c

For over 25 years I have been fascinated with security, with


09:58
DOGE & Social Security Numbers: Something You Need to Know
22:59
The Hidden Danger: Insider Threats Exposed
21:43
The Untold Story of Drones
11:04
🚨 AI Voice Cloning Scams EXPOSED – Don’t Fall for This in 2025!
08:44
💰 The $25.6M Deepfake Heist – Could You Be Next?
15:11
Spied On, Tracked, Controlled - The Truth About Spyware
29:03
How to Detect and Avoid Ai Generated Deepfake Scams
16:01
History of the Future: The AI Revolution
18:48
AI, Quantum & Robotics: Are We Ready?
18:32
The Internet Was Built for War—Not You.
10:15
Censored, Blocked, Tracked? A VPN Fixes That.
12:24
Ad-Tech - You Said It, Now It’s an Ad? Here’s Why.
02:05
Stop Using QR Codes in 2025 - Plain English, in 2 minutes.
03:42
Cybersecurity for Remote Workers: How to Protect Your Data While Working from Home
42:34
Technology Law Expert - Robert Kost
20:12
'#Hacked2' with Cyber Security Expert and Author Albert Whale.
13:51
Silent SMS & OTA: The Invisible Hack
05:45
Juice Jacking: How Public Charging Ports Can Hack Your Phone & The Simple Solution
08:07
Creating Your Personal Security Plan: A Simple Guide to Staying Safe Online
06:49
How Thieves Steal Your Car in 90 Seconds or Less.
02:25
Unlock Any Phone with the UFED Tool by Cellebrite – Apple and Android Devices
26:09
Cellphone Surveillance Explained - Stingray/IMSI Catchers
07:22
How Cell Networks Track Your Location with GPS-Like Accuracy 📱
02:33
Biometric Fingerprint Locks: What You Should Know About Privacy and Security
04:31
Top 3 Questions Answered: Top 3 Questions About Cell Phone Surveillance, Spying, Hacking & Tracking
02:13
The Safest Way to Store Your Passwords: Why a Physical "Little Black Book" Is Still Secure
03:58
Are You at Risk of Juice Jacking? How to Stay Safe at Public Charging Stations
06:53
How Home Cell Signal Boosters (Femtocells) Can Be Hacked: Protect Your Data
07:09
How to Protect Your Cell Phone from Tracking, Spying, Stalking, Hacking, and Eavesdropping