
Sign up to save your podcasts
Or


In this eye-opening episode of the TOSS C3 Podcast, host Neil Haley is joined by cybersecurity visionary and TOSS C3 founder Greg Hanna to uncover a chilling reality: your affordable tech could be your biggest cybersecurity threat.
Together, they dissect the alarming rise of supply chain cyberattacks — including the recent discovery of guerrilla malware infecting over 9 million Android devices. This isn’t just theory — it’s happening now, and it’s hitting everyday users.
From pre-installed malware on low-cost smartphones to weaponized USB drives and fake crypto wallets, Greg and Neil shine a light on how hackers are embedding malicious code directly into budget electronics — before they even leave the factory.
🔍 In this episode, you’ll discover:
Why “cheap” tech could be silently spying on you
How cybercriminals use global supply chains to scale attacks
The hidden risks behind free gadgets, promotional USBs, and off-brand electronics
What guerrilla malware is — and how it works
Practical steps to safeguard your devices, data, and privacy
🎧 Who should listen:
Entrepreneurs, business leaders, IT professionals, parents, and anyone who owns a smartphone or uses digital tools — this is a critical wake-up call for anyone living in today’s hyperconnected world.
Don’t let a $30 gadget cost you your identity.
Listen now and learn how to defend yourself before it’s too late.
By TOSS C3In this eye-opening episode of the TOSS C3 Podcast, host Neil Haley is joined by cybersecurity visionary and TOSS C3 founder Greg Hanna to uncover a chilling reality: your affordable tech could be your biggest cybersecurity threat.
Together, they dissect the alarming rise of supply chain cyberattacks — including the recent discovery of guerrilla malware infecting over 9 million Android devices. This isn’t just theory — it’s happening now, and it’s hitting everyday users.
From pre-installed malware on low-cost smartphones to weaponized USB drives and fake crypto wallets, Greg and Neil shine a light on how hackers are embedding malicious code directly into budget electronics — before they even leave the factory.
🔍 In this episode, you’ll discover:
Why “cheap” tech could be silently spying on you
How cybercriminals use global supply chains to scale attacks
The hidden risks behind free gadgets, promotional USBs, and off-brand electronics
What guerrilla malware is — and how it works
Practical steps to safeguard your devices, data, and privacy
🎧 Who should listen:
Entrepreneurs, business leaders, IT professionals, parents, and anyone who owns a smartphone or uses digital tools — this is a critical wake-up call for anyone living in today’s hyperconnected world.
Don’t let a $30 gadget cost you your identity.
Listen now and learn how to defend yourself before it’s too late.