Smashing Security

Flash card f-up and energy pipe pilfering


Listen Later

The US military has been caught exposing its nuclear weapons secrets, and we explore the world of nerdy miners.

All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by "Lola."


Visit https://www.smashingsecurity.com/230 to check out this episode’s show notes and episode links.


Follow the show on Twitter at @SmashinSecurity, or on the Smashing Security subreddit, or visit our website for more episodes.


Remember: Follow us on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!


Warning: This podcast may contain nuts, adult themes, and rude language.


Theme tune: "Vinyl Memories" by Mikael Manvelyan.


Assorted sound effects: AudioBlocks.

Sponsored By:

  • 1Password: Around 80% of business data breaches result from weak or reused passwords. Using 1Password can close the gaps in your company’s security, combat shadow IT, and help your employees stay both productive and secure, wherever they are.

  • 1Password makes the secure thing to do the easiest thing to do.

  • Instant control, effortless management. Quickly deploy 1Password to a single team, multiple teams, or your entire enterprise. Provision employees using trusted systems, respond quickly to domain breach reports, and offer every business user a free 1Password Families account for work-from-home security.

  • Find out more and try 1Password free for 14 days at 1Password.com
  • JumpCloud: JumpCloud’s Directory Platform makes it easier to solve today's IT challenges by unifying device and user management through a single pane of glass.

  • With JumpCloud securely managing your users and their devices, doing common things like onboarding and offboarding remote workers is easy.

  • Try JumpCloud for free today at smashingsecurity.com/jumpcloud and help your organization move to a modern, secure hybrid work model.
  • Deep Secure: Deep Secure Threat Removal takes incoming poisoned Word documents, boobytrapped PowerPoint slides and the like, and creates brand new files with just the good stuff (and none of the bad). It is a great way of handling brand new threats coming into organisations via the web, email or file sharing and can run alongside your existing anti-virus.

  • Threat Removal gives you the good stuff by delivering files that are 100% threat-free, fully functional and fully revisable.

  • Visit deep-secure.com/smashingsecurity for more information, and set up your free trial today.

Support Smashing Security

Links:

  • WarGames (1983 movie starring Matthew Broderick) — Wikipedia.
  • Cram: Create and Share Online Flashcards.
  • Chegg flashcards.
  • US Soldiers Expose Nuclear Weapons Secrets Via Flashcard Apps — Bellingcat.
  • 'Three nerds' linked to massive Bitcoin mine found in Sandwell warehouse — Birmingham Mail.
  • Sandwell Bitcoin mine found stealing electricity — BBC News.
  • The Berglas Effect: Magic's Best Card Trick — The New York Times.
  • David Berglas and the Legendary Berglas Effect — YouTube.
  • West Cork podcast — Acast.
  • Smashing Security merchandise (t-shirts, mugs, stickers and stuff)



This podcast uses the following third-party services for analysis:

OP3 - https://op3.dev/privacy
...more
View all episodesView all episodes
Download on the App Store

Smashing SecurityBy Graham Cluley

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

308 ratings


More shows like Smashing Security

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,982 Listeners

Risky Business by Patrick Gray

Risky Business

364 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

639 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

371 Listeners

Hacked by Hacked

Hacked

182 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,013 Listeners

Click Here by Recorded Future News

Click Here

408 Listeners

Malicious Life by Malicious Life

Malicious Life

925 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,917 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

163 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

190 Listeners

Hacking Humans by N2K Networks

Hacking Humans

311 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

76 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

128 Listeners

Hacker And The Fed by Chris Tarbell & Hector Monsegur

Hacker And The Fed

168 Listeners