Wednesday, November 30, 2022
Smashing Security

299: EV charging risks, FTX, and an ancient apocalypse

Deepfake shenanigans strike users of troubled crypto firm FTX, the perils of charging your electric vehicle, and is Microsoft's takeover of Activision good news for video game fanatics.All this and much much more is discussed in the latest edition...
Smashing Security

298: Housing market scams, Twitter 2FA, and the fesshole

Elon Musk is still causing chaos at Twitter (and it's beginning to impact users), are scammers selling your house without your permission, and Google gets stung with a record-breaking fine.All this and much much more is discussed in the...
Smashing Security

297: Mastodon 101, and the Hushpuppi saga

Graham offers some security and privacy advice for those exodusing Twitter to Mastodon, and Carole slams the door shut on a notorious scammer with a huge Instagram following.All this and more is discussed in the latest edition of the...
Smashing Security

296: Twitter turmoil, AI animal chatters, and metaverse at work

Twitter has a new chief twit in the form of Elon Musk and he's causing problems, scientists say artificial intelligence may help us communicate with animals, and is the office of the future set in the metaverse?All this and...
Smashing Security

295: Slushygate, sextortion, and nano-targeting

What is slushygate and how does it link to sextortion in the States? What is the most impersonated brand when it comes to delivering phishing emails?  And what the flip is nano-targeting?All this and much much more is discussed...
Smashing Security

294: The Virgin trains swindler, cyber clowns, and AirTag election debacle

Someone's election-fiddling is uncovered with an Apple AirTag, a cyber scandal rocks Germany, and a swindler steals a fortune due to trains being delayed.All this and much much more is discussed in the latest edition of the "Smashing Security"...
Smashing Security

293: Massive crypto bungle, and the slave scammers

A couple unexpectedly find $10.5 million in their cryptocurrency account, and in Cambodia people are being forced to commit scams.All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham...
Smashing Security

292: Trussterflucks and eBay stalking

Has new UK prime minister Liz Truss been careless with her mobile phone, and hear the most extraordinary story of corporate cyberstalking.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by...
Smashing Security

291: Deepfake dangers, AI image opt out, and controlling your urges

Anti-porn "shamware" apps take a privacy pounding, is your image already being used by AI, and deepfake danger continues to deepen.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer...
Smashing Security

290: Uber, Rockstar, and crystal balls

Researchers reveal how your eyeglasses could be leaking secrets when you're on video conferencing calls, we take a look at the recent data breaches involving Uber and Grand Theft Auto 6, and we cast an eye at what threats...
Smashing Security

289: Printer peeves, health data hangups, and Twitter tussles – with Rory Cellan-Jones

How could your inkjet printer finally help you make some money, why is it so hard to share our health data even if we want to, and what result do you want to see from the Elon Musk vs...
Smashing Security

288: Chiquita banana, dumb criminals, and detecting ring binders

Students learn a valuable lesson when it comes to AI detecting guns on campus, SIM swappers are surprisingly stupid, and romance scammers get scammed by someone (or some thing?) calling themselves Chiquita Banana.All this and much much more is...
Smashing Security

287: Lost in translation, spiders, and slapping tortillas – with Mikko Hyppönen

We're back from our summer break as we ask how did a cryptomining campaign stay unspotted for years, quiz special guest and infosec rockstar Mikko Hyppönen about his book, and ponder what spiders teach us about misinformation.All this and...
Smashing Security

286: Hackers doxxed, Pornhub probs, and Co-op security measures

Pornhub has a problem, the UK's Co-op supermarket is accused of big brother tactics, and we take a look at a security researcher's attempt to reveal the true identify of hackers. All...
Smashing Security

285: Uber's hidden hack, tips for travel, and AI accent fixes

Uber may not face prosecution over its handling of a 2016 data breach - but its former chief security head does; how to defend your digital devices' data while on vacation,...
TechRepublic

What is Account Takeover and How to Prevent It in 2022

An account takeover (ATO), in which criminals impersonate legitimate account owners to take control of an account, are on the rise in Asia and across the world. Fraudsters are swindling money and digital assets from consumers across industries, with...
TechRepublic

The OWASP Top 10 – How Akamai Helps

OWASP publishes a list of the 10 most common vulnerabilities in web applications. This white paper details how Akamai can help mitigate these threat vectors. The post The OWASP Top 10 – How Akamai Helps appeared first on TechRepublic.
TechRepublic

Gartner: How to Respond to the 2022 Cyberthreat Landscape

A new Gartner® report, How to Respond to the 2022 Cyberthreat Landscape, focuses on the new threats organizations will face as they prepare for the future of work and accelerate digital transformations. Gartner’s advice will help security and risk...
TechRepublic

Gartner MQ WAAP 2022

Research shows that web applications and API attacks continued to explode in the first half of 2022. Does your organization have the best defense today? Akamai recommends deploying a holistic web application and API protection (WAAP) solution. The right...
TechRepublic

How Akamai Helps to Mitigate the OWASP API Security Top 10 Vulnerabilities

Experts warn that API attacks will soon become the most common type of web application attack. As a result, organizations and their security vendors need to align across people, processes, and technologies to institute the right protections. The Open...