Tuesday, August 3, 2021
Smashing Security

238: Fashion captain, fraud family, and DEF CON. D'oh!

Pygmy hippopotamus bugs, DEF CON's data slip-up, and phishing fraudsters have their collars felt. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by...
Smashing Security

237: NuNa, NuNu, NaNa

Spy software known as Pegasus has been used to carry out surveillance on the smartphones of journalists, activists, and political leaders. Can a "Freedom Phone" be trusted? And a ransomware-hit...
Smashing Security

236: Stingrays, soccer, and smart homes

How did investigators ask a romance scammer out on a date, smart homes continue to play dumb, and is it time for social media sites to do more about racist football...
Smashing Security

235: REvil returns, TikTok grows, and Gettr defaced

A ransomware gang has exploited a security hole in software used by many businesses, and are demanding $70 million for a decryption tool. Plus we take a close look at...
Smashing Security

234: Cozy Bear, dildo scams, and robo hires and fires

Microsoft warns about a hacking gang that is far from cuddly, algorithms rather than managers are firing people, and our guest receives a surprising email from "Amazon"... And you will NOT want...
Smashing Security

233: Peloton problems, romance regret, and Weiner woes

We take a look at why Peloton is being accused of ransomware-like behaviour, how one man lost $250,000 in a romance scam, and how a chap called Weiner has found himself...
Smashing Security

232: Zoomolympics and language matters

Video gaming giant Electronic Arts suffers a hack following slack security, the Japanese Olympics are proving unpopular with everyone apart from cybercriminals, and le coq est mort. All this and much much...
Smashing Security

231: Sexy snaps and encrypted chat traps

Criminals are caught in a encrypted chat trap, should you trust Apple's repair team with your sexy snaps, and do you think the FBI should be able to tell who has...
Smashing Security

231: Sexy snaps and encrypted chat traps

Criminals are caught in a encrypted chat trap, should you trust Apple's repair team with your sexy snaps, and do you think the FBI should be able to tell who has...
Smashing Security

230: Flash card f-up and energy pipe pilfering

The US military has been caught exposing its nuclear weapons secrets, and we explore the world of nerdy miners. All this and much much more is discussed in the latest edition of...
Smashing Security

229: Dating leaks, right to repair, and a stinky bishop

A big cheese ends up in jail, a Japanese dating site spills the dirt after a hack, and we learn all about the right to repair. All this and much much more...
Smashing Security

228: Pipeline pickle, Blockchain bollocks, and Eufy SNAFU – with Rory Cellan-Jones

The Colonial Pipeline attack has shone light on the activities of the Darkside ransomware gang, we take a skeptical look at cryptocurrencies and the blockchain, and Eufy security cameras suffer an...
Smashing Security

227: Phishing foul-up, Twitter tip jars, and Facebook's Apple fury

Facebook says it's sticking up for the little guys as it picks a fight with Apple, there are testing times on the trains, and Twitter takes a tip. All this and much...
Smashing Security

226: Cryptocrazies and NFTs

How did the SCAM cryptocurrency become a success? Why is Google allowing government rip-off ads to still appear on search results? And why on earth is everyone suddenly spending millions of...
Smashing Security

225: Master of your domain, gripe sites, and John Deere Farmergeddon

Google loses its domain in Argentina, how do gripe sites make their dough, and has John Deere solved the cybersecurity problem? All this and much much more is discussed in the latest...
SecurityWeek

Mismanagement Driving Cybersecurity Skills Gap: Research

“To some extent, this data supports the theory that the cybersecurity skills shortage is related to mismanagement rather than a dearth of qualified candidates or advanced skills.” read more
Google

Linux Kernel Security Done Right

Posted by Kees Cook, Software Engineer, Google Open Source Security TeamTo borrow from an excellent analogy between the modern computer ecosystem and the US automotive industry of the 1960s, the Linux kernel runs well: when driving down the highway,...

Raccoon Stealer Bundles Malware, Propagates Via Google SEO

An update to the stealer-as-a-service platform hides in pirated software, pilfers crypto-coins and installs a software dropper for downloads of more malware.
SecurityWeek

SAP Customer Survey Reveals False Sense of Security

Many SAP customers have a false sense of security, according to a new report from risk management consultancy Turnkey Consulting and business-critical application security firm Onapsis. The SAP Security Survey Report 2021 is based on information from over 100 SAP...

BazarCaller – the malware gang that talks you into infecting yourself

Calling someone back feels safer than clicking an unknown link... but it isn't! Remind your friends and family.