podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
MetaCompliance
Shows
Smashing Security
Fake Susies, flawed systems, and fruity fixes for anxiety
A bizarre case of political impersonation, where Trump’s top aide Susie Wiles is cloned (digitally, not biologically — we think), and high-ranking Republicans start getting invitations to link up with "her" on Telegram to share their Trump pardon wishlists. Was it a deepfake? Or just someone with a halfway decent impression and access to a shady data broker?Meanwhile, we take a worryingly familiar journey into the mental health crisis in the UK — and how TikTok is stepping in with advice like “eat an orange in the shower” to cure your anxiety. Spoiler: it won’t. But it might mak...
2025-06-05
34 min
Smashing Security
Star Wars, the CIA, and a WhatsApp malware mirage
Why is a cute Star Wars fan website now redirecting to the CIA? How come Cambodia has become the world's hotspot for scam call centres? And can a WhatsApp image really drain your bank account with a single download, or is it just a load of hacker hokum?All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Allan Liska.Warning: This podcast may contain nuts, adult themes, and rude language.Episode links:
2025-05-29
47 min
Beyond the Firewall
Choices Choices: Behavioural Science and Cyber-Compliance
Your staff’s split-second decisions, like clicking an innocent link, could be the unsuspecting gateway to a security nightmare! Join Christian Hunt and Robert O'Brien as they delve into effective strategies aimed at shaping staff security behaviours and mitigating the risks associated with security missteps. This 45-minute webcast will discuss: • The intricacies of human behaviour and why people make the choices they do. • Common pitfalls in cyber awareness training and techniques to guide staff towards the correct choices. • Behavioural science strategies to fortify your security measures. • The role of senior leadership in setting an example.
2024-06-17
41 min
Beyond the Firewall
Cyber Shock Absorber or Sin Eater? A Cyber Security State of the Nation for 2024
Step into the future with our upcoming webcast as we delve into the intricacies of defence strategy in the age of AI and automation. In this 45-minute session, we will navigate through the challenges that lie ahead, shedding light on the indispensable role played by those entrusted with the security of our organisations and societies. Explore: • The looming threat posed by Gen-AI and deepfakes. • The positive aspects of generative AI and its potential benefits. • Who is responsible for confronting and mitigating these evolving risks. • The critical role of a CISO in safeguarding against emerging threats. • Best practices to fortify against th...
2024-06-17
40 min
Beyond the Firewall
How to Make Offensive Security your Cyber Defence Superpower
Cyber attacks are becoming increasingly sophisticated and frequent, making it critical to adopt a proactive approach to cyber security. Listen to our podcast, ‘How to Make Offensive Security your Cyber Defence Superpower’ and explore how you can identify and remediate security vulnerabilities before they can be exploited by attackers. During this 45-minute session, we’ll cover: • Understanding the concept of offensive security and why it’s crucial for cyber security. • How to integrate offensive security to bolster your defence against threats. • The often-overlooked importance of physical security.Guest speaker - Phillip Wylie, Security Solutions Specialist at CYE.
2023-05-26
43 min
Beyond the Firewall
Privileged User Awareness: The Keys to the Kingdom
Privileged Accounts = Targeted Accounts. Once compromised, these privileged credentials give hackers the "keys to the kingdom," allowing them to gain access to your most sensitive and critical information. Listen to our podcast, ‘Privileged User Awareness: The Keys to the Kingdom’ and learn the steps you can take to secure privileged user accounts and mitigate risks. During this 45-minute session, we will cover: • The problem with privileged user accounts • How cybercriminals target and exploit privileged users • The steps organisations can take to mitigate risksGuest speaker: Joseph Carson, Delinea’s Chief Security Scientist and Advisory CISO
2023-05-04
40 min
Beyond the Firewall
Could Social Engineering Exist Without Email?
Social engineering takes many forms, but email continues to be the most attractive attack vector for hackers to get a footing into our personal and professional lives. In our podcast, "Could Social Engineering Exist Without Email," we will examine why email remains a favoured target for malicious attacks and explore ways for organisations to fortify their defences. During this 45-minute episode, we will cover:· The story of renowned social engineer and email prankster James Linton.· The reasons why email is a prime target for exploitation.· Best practices for...
2023-03-09
40 min
Beyond the Firewall
Get Smart about Smartphone Cyber Security
Our smartphones are always an arm’s length away, but how aware are we of the security risks they pose? Smartphones are a portal into our increasingly digital-first lives. Should they fall into the wrong hands, they’re a potential treasure trove of information. Our podcast, ‘Get Smart about Smartphone Cyber Security’, explores the cyber risks posed by smartphones and how to mitigate them. This 45-minute podcast discusses:• The impact smartphones have had on our lives • How smartphones have evolved to become a significant risk vector• The cyber risks smartphones po...
2023-01-26
40 min
Beyond the Firewall
The Reality of Securing C-Suite Support for Human Security
C-suite engagement is essential to embed the culture and tone necessary for effective cyber risk management. Despite the reality that cyber attacks are evolving and becoming more complex, making cyber security a C-level priority is no easy endeavour.Our podcast, ‘The Reality of Securing C-Suite Support for Human Security’, explores the challenges with leadership support in cyber security, and the approach to gain buy-in at an executive level.This 40-minute podcast will discuss:• Why buy-in from the top is important for security awareness program success• Challenges in engaging and maintain...
2022-12-02
36 min
Beyond the Firewall
Business Benefits on Information Security Frameworks
The speed at which technology and cybercrime rapidly evolve makes it increasingly difficult for organisations to remain cyber-secure and compliant.Consequently, the need to implement effective Information Security frameworks has heightened. With these frameworks in place, organisations can define the processes and procedures to assess, monitor, and mitigate cyber risk.Our upcoming webcast, ‘Business Benefits of Information Security Frameworks’, explores the business value of Information Security frameworks and how to build a robust cyber security strategy.This 45-minute podcast will discuss:• The why and what of standards, regulations, policies, and frameworks•...
2022-11-03
40 min
Beyond the Firewall
Cyber Security Awareness for Dummies
Join award-winning cyber security thought leader and Cyber Security Awareness for Dummies author, Robert O’Brien as he offers a best practice approach to tackling staff awareness campaigns and improving employee security behaviours.In this podcast we will cover:The modern Cyber Security landscape and secure working from home challengesDetermining what Cyber Security awareness means for your organisationThe challenges of changing organisational security cultureThe importance of policies to establish safe baselinesHow to set up a staff awareness programTop 10 cyber awareness ti...
2022-10-12
24 min
Beyond the Firewall
Best Practice for Cyber Security Awareness Month
Cyber Security Awareness Month, celebrated every October, helps to highlight the importance of cyber security and the collective effort required to prevent cyber attacks. However, a month-long initiative is not enough to make a real, long-lasting impact on staff security behaviours. Our podcast, ‘Best Practice for Cyber Security Awareness Month’, explores how organisations can make the most of Cyber Security Awareness Month and keep security top of mind all year round. This 40-minute podcast will discuss: • Cyber fatigue and the difficulty of engaging users • Tips for planning Cyber Security Awarenes...
2022-09-29
39 min
Beyond the Firewall
Cyber Resilience In An Era of Geopolitical Risk
In the wake of the Ukraine crisis, pandemic challenges, inflation spikes and fragile global supply chains, organisations are faced with a magnitude of risk and uncertainty.To tackle the threat, organisations must exercise vigilance in understanding emerging risks and in acting to reduce exposure and limit damage.Our upcoming webcast ‘Cyber Resilience in An Era of Geopolitical Risk’ explores how organisations can improve their cyber resilience, threat detection and incident response in an increasingly hostile world. This 35-minute podcast will discuss:· The importance of Policy Management within the macro envir...
2022-08-02
37 min
Beyond the Firewall
Beyond Awareness Training: Cultivating a Security Culture
The effectiveness of a Security Awareness Training program ultimately depends upon improving the security behaviours of staff.However, security training alone will not change employee behaviours. Until and unless awareness training affects how staff feel about the need to secure information, and their security instincts, organisations will continue to be vulnerable to cyber risk.Our upcoming webcast ‘Beyond Awareness Training: Cultivating A Security Culture’ explores why organisations must go beyond awareness training and instil a security mindset that transforms staff into their frontline defence against cyber attacks.This 45-minute webcast will discuss:•...
2022-06-30
40 min
Beyond the Firewall
Resistance to Cyber Resilience
In today’s fast-changing, digital world, cyber threats are rapidly evolving.The adoption of new technologies and new ways of working has increased the opportunities for cybercriminals to target employees and launch crippling attacks - which can result in significant operational disruption, financial loss, and reputational damage.As cyber attacks become more destructive and unpredictable, organisations must build a cyber-resilient posture to effectively prepare, respond, and recover from inevitable cyber disruptions.Our upcoming webcast ‘Resistance to Cyber Resilience’ explores how organisations can remain cyber resilient, overcome inertia and drive behaviour change.This 40-minute podcas...
2022-06-07
36 min
Beyond the Firewall
Role of Privacy in the 'S' In ESG
ESG – Environmental, Social, Governance – is getting a lot of attention, and it is time for organisations to build a strategic ESG plan for reporting in 2022.In this new era of ESG, organisations have a renewed focus on privacy. Privacy is more than complying with laws and regulations. Privacy is about the integrity and accuracy of data, the right of individuals to control and have access to their personal data, appropriate and approved use, and data protection.Our podcast, with internationally recognised GRC pundit, Michael Rasmussen, titled, ‘Role of Privacy in the S in ESG’ explores privacy...
2022-04-29
38 min
Beyond the Firewall
Fighting Cybercrime in the Financial Services Sector
When it comes to cybercrime, no industry is safe. However, the financial sector continues to be heavily targeted and is a highly lucrative target for cybercriminals because their data is more valuable.For financial institutions, the potential damage from cyber attacks extends beyond simply stealing money from customer accounts but also costs firms their revenue, reputation and customer base. To protect themselves and their customers in an increasingly dangerous digital environment, cyber security has become a vital investment for financial institutions.Our upcoming webcast, titled ‘Fighting Cybercrime in the Financial Services Sector’, explores the...
2022-04-29
44 min
10X Managers Podcast - LIVE!
How to Rapidly Rise the Ranks in Your Organisation
This week's leader is Reneilwe O'Kane who the Head of SDR at MetaCompliance. In this interview, she shares actionable insights around: Employee-First Management 🏆 Building an Extreme Ownership Culture 🗼 Assume the Best in your Employees 🤝 How to Create a Psychologically Safe Environment ☔ When and How to Performance Manage ⚒️ Transitioning to Management 🤵 Coaching Employees with No Experience 🆕 If you Believe in Something, Go Make Change! 🎇 To get full access and exclusive content to this interview check it out at: https://10xmanagers.com/mii-view/reneilwe-okane --- Send in a voice message: https://anchor.fm/josh-gain4/message
2022-04-04
44 min
Human Factor Security
Sarah Janes
On this episode of the Human Factor Security Show, Jenny speaks to Founder of Layer8 Sarah Janes about culture, champions and why being an eternal optimist is good for productivity. Thanks for a great interview Sarah! To follow Sarah on LinkedIn, click here. To follow Sarah on Twitter, click this link. Thank you to this episode's sponsor, MetaCompliance, for supporting the show. Don't forget, check out the FREE ebook ‘Cyber Security Awareness for Dummies’, written by Robbie O'Brien the CEO of MetaCompliance, by clicking this link here. To get in touch t...
2022-03-18
29 min
Beyond the Firewall
The Realities of Getting Staff Security Training Right
Despite the ongoing threat of cyber attacks, Security Awareness Training remains a major challenge for management teams. Identifying what training needs to be delivered, who needs to be trained and a lack of employee engagement are all common obstacles that organisations face when it comes to implementing security awareness training. As every organisation knows, change management is notoriously difficult. The best security awareness programs approach the task in the same way as other organisational change projects. Change isn’t a given; it takes time and effort. The reality is cyber security can be a dry to...
2022-03-07
34 min
Beyond the Firewall
The Power of Company Personality in a Cyber Awareness Program
User participation is one of the key measures of success in a cyber awareness program. All too often, organisations adopt a one size fits all solution that fails to resonate with the end-user. Incorporating company personality into your cyber awareness program is an effective way to tailor training to suit your audience and develop a campaign that engages employees. This podcast will explore:-The role of company personality in your cyber awareness program -Analysing your audience to create an awareness campaign that resonates -How to make your cyber awareness program relatable for your...
2022-02-24
27 min
Beyond the Firewall
Insider Threats: The Dangers Within
Whether accidentally or deliberately, employees can put organisations at significant risk of a cyber attack. The task of defending against such threats is difficult because insider threats are often difficult to detect.The pandemic and the shift to remote working have contributed to the growing rate of insider threats in recent years and will continue to be an ongoing challenge for organisations.This podcast will discuss:• Internal threats versus external threats• Types of insider threats and their motivating factors• The risks that insiders pose• How to protect your org...
2022-02-24
41 min
Beyond the Firewall
The Data Breach Blame Game: Employees or Employers?
With cyber security lawsuits on the rise, the probability and financial impact of cyber incidents are ever-growing for organisations. The aftermath of a data breach can have crippling consequences across all aspects of an organisation and there is inevitably a blame game that follows any cyber incident.This podcast will discuss:-The role of leadership and setting the tone from the top-Mitigating the risk of a data breach and limiting the damage if a data breach occurs-Why data breach prevention is the job of everyone and cyber...
2022-02-22
36 min
Beyond the Firewall
Security Awareness Training: Why So Serious?
There’s no denying it - cyber security is serious stuff. The problem is that many organisations believe that because of the dangers of cyber attacks, Security Awareness Training must also be delivered in a serious manner. But this approach can cause fatigue among a workforce, hurting more than it helps – which is no laughing matter. One of the best ways to educate staff and ensure key messaging is retained is by incorporating entertainment and humor into Security Awareness Training. This allows organisations to break down barriers, open conversations, make emotional connections, and win hearts and...
2022-02-17
32 min
Beyond the Firewall
Next Generation Security Awareness Training
Cyber security in the workplace has become increasingly important as more organisations migrate to digital and the cloud. With the adoption of digital channels growing exponentially across all sectors, so too has the number of high profile data breaches and ransomware attacks. As regulators and auditors seek evidence of security awareness activities, organisations are under enormous pressure to proactively protect their people, reputation, and valuable assets. Still, many cyber security awareness initiatives fall flat due to a lack of engagement from end users. To efficiently and effectively build a highly skilled workforce that is prepared to...
2022-02-17
27 min
Beyond the Firewall
Key Steps to Implementing an Agile Policy Management Program
In today’s complex business environment, organisations need to be able to respond rapidly to any changes and adapt policies where necessary. The only way to adapt to the dynamic, disrupted, and distributed nature of business is to be agile. This requires organisations to have an agile policy management program in place so they can react quickly to changes in risks, regulations, strategy, processes, roles, and responsibilities.An effective policy management program will provide a framework of governance, identify risks, define compliance, and play a crucial role in organisational success. It should also engage staff an...
2022-02-17
36 min
Beyond the Firewall
Incident Management: Controlling the Chaos
The aftermath of a cyber attack can be chaoticAn incident response plan enables organisations to detect, contain, eradicate, and recover from an attack effectively, without chaos. By reinstating normal operations as quickly as possible, organisations can limit the damage when an attack occurs. This podcast will discuss: • The digital challenges that organisations are facing today • Training people to recognise and respond to a cyber incident • Accountability after a cyber attack • Failing to plan is planning to fail • How organisations can learn from security incidents ...
2022-02-17
41 min
Beyond the Firewall
Cyber Security: Is the Nightmare Between the Chair and the Keyboard?
Despite increased investment in cyber security initiatives, organisations continue to be impacted by cyber attacks. Almost all successful breaches share one variable in common: human error. The reality is organisations face a very real danger of threat from within.Against the backdrop of a complex cyber threat landscape, the insider threat has intensified as working practices have evolved and cybercriminals launch increasingly sophisticated attacks. The mitigation of human-born error is key to reducing cyber risk in an organisation and a proactive approach to prevent employee-related threats has never been more important.This podcast...
2022-02-07
37 min
Human Factor Security
Gina Fiore
In this episode Jenny chats to professional gambler Gina Fiore. They discuss Gina's awesome career and the similarities it has with social engineering as well as evasion tactics, disguises and the pressures of undercover work. Thanks to Gina for an awesome interview. To find out more about Gina, click here for her website. To follow Gina on Twitter, click the link here. Thank you to this episode's sponsor, MetaCompliance, for supporting the show. Don't forget, check out the FREE ebook ‘Cyber Security Awareness for Dummies’, written by Robbie O'Brien the CEO of MetaCompliance, by clicking this link here. To get in touch t...
2022-02-04
48 min
Human Factor Security
Gina Fiore
In this episode Jenny chats to professional gambler Gina Fiore. They discuss Gina's awesome career and the similarities it has with social engineering as well as evasion tactics, disguises and the pressures of undercover work. Thanks to Gina for an awesome interview. To find out more about Gina, click here for her website. To follow Gina on Twitter, click the link here. Thank you to this episode's sponsor, MetaCompliance, for supporting the show. Don't forget, check out the FREE ebook ‘Cyber Security Awareness for Dummies’, written by Robbie O'Brien the CEO of MetaCompliance, by clicking this link here. To get in touch tr...
2022-02-04
1h 03
Human Factor Security
Lauren Zink
On this episode Jenny chats with Lauren Zink who will be familiar to many in the security industry as an authority on security awareness and communications. They chat about Lauren's background in education and hear her recommendations for getting your training to land across the business. This was a great interview with a real expert in the field, thanks to Lauren for being an awesome guest. To follow Lauren on Twitter, click the link here. For Lauren's LinkedIn profile, click here for the link. Thank you to this episode's spo...
2022-01-28
28 min
Human Factor Security
Sam Humphries
In this episode Jenny chats with Sam Humphries of Exabeam. They talk about Sam's career in cyber via doubting headmasters and travel agency politics, as well as her involvement in Bsides Newcastle. Thanks to Sam for an awesome interview! To follow Sam on Twitter, click here for the link. To follow Sam on LinkedIn, click this link here. Thank you to this episode's sponsor, MetaCompliance, for supporting the show. Don't forget, check out the FREE ebook ‘Cyber Security Awareness for Dummies’, written by Robbie O'Brien the CEO of MetaCompliance, by clicking this link here. To get in touc...
2022-01-21
35 min
Human Factor Security
Robert O'Brien
Jenny is joined by MetaCompliance CEO, Robert O'Brien. They chat about the ethos behind the company, how personality and humour can be used in training and how there should be no tick box exercises when improving employee security behaviour. To learn more about MetaCompliance click the following links; For LinkedIn, click this link. For Twitter, click here. For Instagram, click the link here. For Facebook, click here for the link. Thank you to this episode's sponsor, MetaCompliance, for supporting the show. Don't forget, chec...
2021-12-22
45 min
Human Factor Security
Tal Arad
Jenny is joined by Tal Arad, the CISO at Carlsberg. They discuss Tal's journey into the industry, his views on recruiting and the progressive and innovative attitude that Carlsberg has as a company, including getting paid in BEER! To follow Tal on LinkedIn, please click this link here. Thank you to this episode's sponsor, Metacompliance, for supporting the show. Don't forget, check out the FREE ebook ‘Cyber Security Awareness for Dummies’, written by Robbie O'Brien the CEO of Metacompliance, by clicking this link here. To get in touch try the contact...
2021-11-23
25 min
Human Factor Security
Professor Tiziana Casciaro
In this episode, Jenny is joined by Professor Tiziana Casciaro, author, speaker and academic in the field of organisational behaviour. They discuss her latest book "Power for all" and how this contributes to organisational theory and culture. In this fascinating conversation, they also chat about how power and ego are nuanced and unique and ponder the application of the theories in fields such as politics and the workplace. A truly amazing conversation, thanks so much to the Professor for an amazing interview. To follow Tiziana on LinkedIn, click this link here. To fin...
2021-11-16
51 min
Human Factor Security
Mari Galloway
Mari Galloway, author, speaker and award winning CEO of Cyberjutsu, joins Jenny to talk about her career and work. Hear her explain how she got started in the industry, marvel at her work ethic and how she has taught Jenny a new word. Thank you so much, Mari, for the fabulous interview! To follow Mari on LinkedIn, please click this link here. To follow Mari on Twitter, please click here for the link. To learn more about Cyberjutsu, please click the link to the website here. Thank you...
2021-10-20
35 min
Human Factor Security
Phillip Wylie
The Human Factor Security Podcast returns with this awesome interview with author, educator and podcast host Phillip Wylie. He talks to Jenny Radcliffe about careers in cyber, why collaborating is a great idea and how he wrestles a bear. To follow Phillip on LinedIn, click this link here. To follow Phillip on Twitter, click the link here. To get hold of a copy of Phillip's book, The Pentester BluePrint: Starting a Career as an Ethical Hacker, click the Amazon link here. Thank you to this episode's sponsor, Metacompliance, for sup...
2021-10-11
31 min
The Daily Ruckus
Dark Days (Part 3)
Merchandise: https://teespring.com/stores/ruckus-among-usCheck out the Official Daily Ruckus items available on Teespring!Your purchase directly supports the show - THANK YOU!The Daily Ruckus (12/23/20)[News Update]"The Cyber-Cold War"Source Material Referenced:https://www.metacompliance.com/blog/the-next-global-crisis-a-cyber-security-pandemic/https://www.govtech.com/blogs/lohrmann-on-cybersecurity/2020-the-year-the-covid-19-crisis-brought-a-cyber-pandemic.htmlhttps://www.bloomberg.com/news/articles/2020-12-23/debate-over-hackers-motive-rages-amid-calls-for-tough-responseAudio:The Breakfast Club (1985) - What Ruckus?https://www.youtube.com/watch?v=Xo21CkoxEmAPresident-elect Joe...
2020-12-23
26 min
Smashing Security
Vanity Bitcoin wallets, BlueLeaks, and a Coronavirus app conspiracy
A conspiracy spreads on social media about Coronavirus tracing apps, US police find decades' worth of sensitive data leaked online, and is there a Bitcoin bonanza to be had from watching Elon Musk YouTube videos?All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by BBC technology reporter Zoe Kleinman.Visit https://www.smashingsecurity.com/184 to check out this episode’s show notes and episode links.Follow the show on Twitter at...
2020-06-25
51 min
Smashing Security
MAMILs, gameshows, and a surprise from eBay
A TV gameshow with cash prizes if you're obeying Coronavirus lockdown rules, ex-Ebay staff charged in crazy cyberstalking case, and when the wrong cyclist was accused by the internet bearing pitchforks.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.Visit https://www.smashingsecurity.com/183 to check out this episode’s show notes and episode links.Follow the show on Twitter at @SmashinSecurity, or on the Smashing Security su...
2020-06-18
46 min
Smashing Security
Space Force, credit card fraud, and beep-ti-beep
Graham finds himself in hot water with a security firm after a data breach, Carole discusses credit card fraud, and we have a pleasant surprise for Thom Langford, who appears to have mostly agreed to be a guest to promote his own podcast.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Host Unknown's Thom Langford.And don't miss our featured interview with Robbie O'Brien of MetaCompliance, all about the new book he's...
2020-06-11
1h 01
Smashing Security
Apple and Google willy wave while home assistants spy - DoH!
Apple is furious with Google over iPhone hacking attacks against Uyghur Muslims in China, DNS-over-HTTPS is good for privacy but makes ISPs angry, and concern over digital assistants listening to our private moments continues to rise.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by web security journalist John Leyden.Visit https://www.smashingsecurity.com/145 to check out this episode’s show notes and episode links.Follow the show on Tw...
2019-09-12
44 min
Smashing Security
Hacking from outer space, Ukrainian cryptomining, and deepfaked Canadians
Was a cybercrime committed on the International Space Station? What on earth were Ukrainian scientists thinking when they plugged a nuclear power station into the internet? And someone has cloned Canadian clinical psychologist Jordan Peterson's voice...All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley.Visit https://www.smashingsecurity.com/143 to check out this episode’s show notes and episode links.Follow the show on Twitter at @SmashinSecurity, or...
2019-08-29
43 min
Smashing Security
Black Hat and Bridezillas
Say cheese to ransomware on your camera! A sponsored speech at Black Hat causes uproar, and should you trust that Lightning cable you're about to plug into your MacBook?All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Cyberwire's Dave Bittner.Visit https://www.smashingsecurity.com/141 to check out this episode’s show notes and episode links.Follow the show on Twitter at @SmashinSecurity, or on the Smashing Security su...
2019-08-15
51 min
Smashing Security
Capital One hacked, iMessage flaws, and anonymity my ass!
Capital One gets hacked, critical vulnerabilities are found in iMessage, and data anonymization may not be as good as we hope. But listen up, we also discuss the Legend of Zelda, a biography of tech giants, offer advice for escaping an angry moose, and are introduced to... Penelope?All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole 'Penelope' Theriault, joined this week by technology broadcaster David McClelland.Visit https://www.smashingsecurity.com/139 to check out this episode’s sh...
2019-08-01
47 min
Smashing Security
Porn trolling lawyers, Insta hacking, and Ctrl-Alt-LED
Erection your honour! Lawyers find themselves behind bars after they make porn movies in an attempt to scam internet users, boffins in Israel detail a way to steal data from an air-gapped computer, and Instagram coughs up $30,000 after a researcher finds a simple way to hack into anybody's account. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.Visit https://www.smashingsecurity.com/137 to check out this episode’s show notes an...
2019-07-18
44 min
Smashing Security
Zombie grannies and unintended leaks
We take a bloodied baseball bat to Android malware, and debate the merits of a social media strike, as one of the team bites the bullet and buys a smart lock for the office.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Oli Skertchly.Visit https://www.smashingsecurity.com/135 to check out this episode’s show notes and episode links.Follow the show on Twitter at @SmashinSecurity, or on the Sm...
2019-07-04
56 min
Smashing Security
Cookie cock-ups, Hong Kong protests, and smart TV virus scans
We head to Hong Kong to look at how technology has helped anti-government protesters (and how China has tried to disrupt it), Samsung is skittish over whether to tell TV owners to virus-scan their devices, and you won't believe whose website is not GDPR-compliant.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by James Thomson.Visit https://www.smashingsecurity.com/133 to check out this episode’s show notes and episode links....
2019-06-20
56 min
Smashing Security
Zap yourself from the net, and patch now against BlueKeep
Microsoft issues warning to unpatched Windows users about worm risk, and how do you delete all traces of yourself off the internet after you murder your podcast co-host?All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who aren't joined by a special guest this week.Visit https://www.smashingsecurity.com/131 to check out this episode’s show notes and episode links.Follow the show on Twitter at @SmashinSecurity, or on the Smashing Security su...
2019-06-06
34 min
Smashing Security
Too Long; Didn't Listen
Don't hire a hacker, they might scam you! What works and what doesn't when it comes to protecting your email account? And China's controversial social credit system comes under the microscope.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.Visit https://www.smashingsecurity.com/129 to check out this episode’s show notes and episode links.Follow the show on Twitter at @SmashinSecurity, or on the Smashing Security su...
2019-05-23
51 min
Smashing Security
I do love the Dutch
Israel strikes back at Hamas's hacking HQ, a new sextortion email comes with a twist, and Carole saves the world with some help from hacked Roomba vacuum cleaners.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Malicious Life's Ran Levi.Visit https://www.smashingsecurity.com/127 to check out this episode’s show notes and episode links.Follow the show on Twitter at @SmashinSecurity, or on the Smashing Security subreddit, or...
2019-05-09
45 min
Smashing Security
Pick of the thief!
WannaCry's "accidental hero" pleads guilty to malware charges, Samsung and Nokia have fingerprint fumbles, the NCSC publishes a list of 100,000 dreadful passwords, and Apple finds itself at the centre of an identity mix-up.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by John Hawes.Follow the show on Twitter at @SmashinSecurity, on the Smashing Security subreddit, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or your...
2019-04-25
47 min
Smashing Security
Backups - a necessary evil? (replay)
With Graham incapacitated, we drag an episode out from the archives. In this special "splinter" episode of the "Smashing Security" podcast from September 2017 we tackle the tricky subject of backups - When did you last backup your data? How and what should you backup? And where should you store them?Lots of questions and Graham gets to do his Tina Turner impression.All this and more is discussed in this edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis....
2019-04-11
30 min
Smashing Security
An Instagram nightmare, crazy iPhone deaths, and election hack claims
One travel blogger finds you don't have to be Kylie Jenner to be targeted by an Instagram hacker. When 40 iPhones at a hospital mysteriously die, what could be the explanation? And, surprise surprise, political parties in the USA are throwing around hacking accusations.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Naked Security's Mark Stockley.Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes....
2018-11-08
52 min
Smashing Security
Rule 34, Twitter scams, and Facebook fails
A Facebook friend request leads to arrest, Twitter scams ride again via promoted ads, and adult websites expose their members. Oh, and Graham finds out what Rule 34 is.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as...
2018-10-25
50 min
Smashing Security
099: Passwords - A Smashing Security splinter (replay)
With Carole in the wilds of Canada, and Graham knee-deep in a security conference in Glasgow, we drag an episode out from the archives of February 2017 - looking at the thorny subject of passwords.Join computer security veterans Graham Cluley, Carole Theriault, and Vanja Švajcer as they offer some advice and tips for computer users.Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
2018-10-11
16 min
Smashing Security
097: Dash cam surveillance, robocall plague, and Zoho woe
Why was Zoho's website taken offline by its own domain registrar? How are dash cams making you less secure? And why are robocalls on the rise in the United States?All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Cyberwire's Dave Bittner.Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the...
2018-09-27
44 min
Smashing Security
095: British Airways hack, Mac apps steal browser history, and one person has 285,000 texts leaked
Malicious script is being blamed for the British Airways hack, Trend Micro's apps are booted out of the Mac App Store for snaffling private data, and Paul Manafort's daughter wants Twitter to remove a link.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by David Emm of Kaspersky Lab.Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or your favourite podcast...
2018-09-13
42 min
Smashing Security
093: Abandoned domains and dating app dangers
How do fraudsters exploit abandoned domains to steal your company's secrets? How can you better protect your privacy when looking for love online? And who has the longest arms in the animal kingdom?All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who were joined briefly by a man in a wind tunnel for this episode.Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or your favourite...
2018-08-30
37 min
Smashing Security
091: Sextortion, Las Vegas hotels, and Alex Jones
Just how did sextortionists get (some) of the digits in your phone number? Why are some hackers saying they won't be going to DEF CON in Las Vegas anymore? And should Alex Jones from InfoWars be banned from Twitter?All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest Maria Varmazis.Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or...
2018-08-16
48 min
Smashing Security
089: Data breaches, ransomware, Bitcoin robberies, and typewriters
Ransomware rears its head again, Dixons Carphone reveals its data breach was almost 1000% worse than they previously thought, a man is accused of stealing five million dollars worth of cryptocurrency through hijacking mobile phones, and a Canadian guy called Norman is rushing to get the typewriters out of storage.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by journalist Geoff White.Follow the show on Twitter at @SmashinSecurity, or visit our website for more...
2018-08-02
44 min
Smashing Security
087: How Russia hacked the US election
Regardless of whether Donald Trump believes Russia hacked the Democrats in the run-up to the US Presidential election or not, we explain how they did it. And Carole explores some of the creepier things being done in the name of surveillance.All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault.Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of...
2018-07-19
44 min
Smashing Security
085: Doctor Who, Facebook patents, and Bob's Burgers
Doctor Who's TARDIS has sprung a data leak, Facebook's creepy patents are unmasked, and an app to keep women safe on dates has surprising origins.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for...
2018-07-05
37 min
Smashing Security
078: Hounds hunt hackers, too-human Google AI, and ethnic recognition tech - WTF?
Dogs are trained to sniff out hackers' hard drives, facial recognition takes an ugly turn, and do you trust Google to book your hair appointment?All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by investigative journalist Geoff White.Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live...
2018-05-17
43 min
Smashing Security
076: Spying phones, hacked ski lifts, and World Password Day
Cheap Android smartphones sold on Amazon have been sending customers' full text messages to a Chinese server, ski lifts are found to be the latest devices left open to abuse by hackers, and we remind you why password managers are a good idea on World Password Day. Oh, and our guest serenades us with a hit from the 1980s!All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by journalist and broadcaster David McClelland.Follow...
2018-05-03
44 min
Smashing Security
074: Smashing Security isn't bullsh*t
Crime forums on Facebook, fraudsters pose as anti-fraud hotlines, and how big advertising companies are in bed with the rampant data collection of internet giants.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest B J Mendelson, author of "Social media is bullsh*t."Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch...
2018-04-19
48 min
Smashing Security
072: Why are firms so cr*p with our private data?
Grindr, MyFitnessPal, and Panera Bread. They've all had data breach scares of varying degrees this week. Some handled the security breaches well, some didn't. We took a look at how well different firms are respecting your data privacy.All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who don't have a special guest this week.Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or your favourite podcast...
2018-04-05
33 min
Smashing Security
070: Facebook and Cambridge Diabolica
It’s not fair to describe what happened at Facebook and Cambridge Analytica as a data breach - it’s much worse than that. An autonomous Uber vehicle kills a pedestrian. And sextortion continues to be a serious problem.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by researcher Scott Helme.Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or y...
2018-03-22
40 min
Smashing Security
068: Malware from outer space!
If aliens did contact us would it be safe to open the email? Why would MoviePass track film lovers after they leave the cinema? Would you know how to get around Malaysia when your car rental website lets you down? And will Graham please stop talking about text adventure games?All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by journalist (and possible spy) James Thomson.Follow the show on Twitter at @SmashinSecurity...
2018-03-08
44 min
Smashing Security
066: Passwords, pirates, and postcards
Flight simulators packed with password-grabbing malware, Facebook fighting Russian trolls, and how vulnerability researchers fear being sued.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest The CyberWire's Dave Bittner.Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
2018-02-22
39 min
Smashing Security
064: So just a "teeny tiny" security issue then?
A Namecheap vulnerability allows strangers to make subdomains for your website, Troy Hunt examines password length, and ex-Google and Facebook employees are fighting to protect kids from social media addiction.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest HaveIBeenPwned's Troy Hunt.Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch...
2018-02-08
43 min