Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!Got questions/suggestions/s... more
FAQs about Naked Security:How many episodes does Naked Security have?The podcast currently has 719 episodes available.
April 06, 2023S3 Ep129: When spyware arrives from someone you trustA supply chain attack that foisted spyware on trusting users. Wi-Fi encryption bypass via left-over data. Surely there should be TWO World Backup Days?Email [email protected]Original music by Edith Mudge (https://www.edithmudge.com)Twitter @NakedSecurity...more18minPlay
March 30, 2023S3 Ep128: So you want to be a cybercriminal?RIP Gordon Moore, the more in Moore's Law. Photo cropping bugfix. DDoS honeypot. E-commerce patches. Apple 0-day and lots more.Email [email protected]Twitter @NakedSecurity...more20minPlay
March 23, 2023S3 Ep127: When you chop someone out of a photo, but there they are anyway...The mobile phone bugs that Google kept quiet, just in case. The mysterious case of ATM video uploads. When redacted data springs back to life.Email [email protected]Twitter @NakedSecurity...more19minPlay
March 16, 2023S3 Ep126: The price of fast fashion (and feature creep)The price of fast fashion. Firefox fixes. Feature creep fail curtailed in Patch Tuesday updates.Original music by Edith MudgeGot questions/suggestions/stories to share?Email [email protected]Twitter @NakedSecurity...more21minPlay
March 09, 2023S3 Ep125: When security hardware has security holesMemories of Michelangelo (the virus, not the artist). Data leakage bugs in TPM 2.0. Ransomware bust, ransomware warning, and anti-ransomware advice.Original music by Edith MudgeGot questions/suggestions/stories to share?Email [email protected]Twitter @NakedSecurity...more21minPlay
March 02, 2023S3 Ep124: When so-called security apps go rogueHow Woz nearly gave away the Apple I. Rogue software packages. Rogue network "administrators". Rogue keyloggers. Rogue authenticators.Original music by Edith MudgeGot questions/suggestions/stories to share?Email [email protected]Twitter @NakedSecurity...more19minPlay
February 23, 2023S3 Ep123: Crypto company compromise kerfuffleThe first search warrant for computer storage. GoDaddy breach. Twitter surprise. Coinbase kerfuffle. The cost of success.Original music by Edith MudgeGot questions/suggestions/stories to share?Email [email protected]Twitter @NakedSecurity...more19minPlay
February 16, 2023S3 Ep122: Stop calling every breach "sophisticated"!The birth of ENIAC. A "sophisticated attack" (someone got phished). A cryptographic hack enabled by a security warning. Valentine's Day Patch Tuesday. Apple closes spyware-sized 0-day hole.Original music by Edith MudgeGot questions/suggestions/stories to share?Email [email protected]Twitter @NakedSecurity...more18minPlay
February 09, 2023S3 Ep121: When cybercrime victims are culprits, tooCryptocurrency crimelords. Security patches for VMware, OpenSSH and OpenSSL. Medical breacher busted. Is that a bug or a feature?Original music by Edith MudgeGot questions/suggestions/stories to share?Email [email protected]Twitter @NakedSecurity...more21minPlay
February 06, 2023S3 Special: Tracers in the Dark with Andy GreenbergDo we really need a "war against cryptography" - codes and ciphers that the government can easily crack if it thinks there's an emergency - to cement our collective online security?Hear renowned cybersecurity author Andy Greenberg's thoughtful commentary on this and many other vital issues, including anonymity and privacy, as we talk to him about his " rel="noopener noreferrer">tremendous new book, Tracers in the Dark.Original music by Edith Mudge....more26minPlay
FAQs about Naked Security:How many episodes does Naked Security have?The podcast currently has 719 episodes available.