Smashing Security

No Fly lists, cell phones, and the end of ransomware riches?


Listen Later

What are prisoners getting up to with mobile phones? Why might ransomware no longer be generating as much revenue for cybercriminals? And how on earth did an airline leave the US government's "No Fly" list accessible for anyone in the world to download?

All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.

Warning: This podcast may contain nuts, adult themes, and rude language.

Sponsored by:

  • Bitwarden – Bitwarden vaults are end-to-end encrypted with zero-knowledge encryption, including, the URLs for the websites you have accounts for. Migrate to Bitwarden for a more secure password manager.
  • ManageEngine PAM360 – A fully functional privileged access management suite that offers a holistic picture of all the privileged devices, users, and credentials in the IT infrastructure. From managing and governing access to all your enterprise resources to automating the access management life cycle in your organization, PAM360 does it all.
  • NordLayer – NordLayer safeguards your company’s network, securing and protecting remote workforces as well as business data. It can even help you ensure security compliance. Get your first month free.

Episode links:

  • The Complete Idiot's Guide to Writing Erotic Romance - Amazon.
  • The Many Ingenious Ways People in Prison Use (Forbidden) Cell Phone - The Marshall Project.
  • How Did They Run an Elaborate “Sextortion” Scam From Prison? Cellphones - The Marshall Project.
  • Alarm Over Death Row Cell Phone Threats - CBS News.
  • How to completely own an airline in 3 easy steps - Maia arson crimew.
  • U.S. airline accidentally exposes ‘No Fly List’ on unsecured server - Daily Dot.
  • Cyber-crime gangs' earnings slide as victims refuse to pay - BBC. 
  • Ransomware Revenue Down As More Victims Refuse to Pay - ChainAnalysis.
  • Leaked Ransomware Docs Show Conti Helping Putin From the Shadows - Wired. 
  • Luxe Listings Sydney trailer - YouTube.
  • Luxe Listing Sydney - Wikipedia.
  • Matt Shearer WBZ - Twitter.
  • Hot Skull - Netflix. 
  • Smashing Security merchandise (t-shirts, mugs, stickers and stuff)


Support the show:

Tell your friends and colleagues about “Smashing Security”, and leave us a review on Apple Podcasts or Podchaser.

Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!


Follow us:

Follow us on Twitter at @SmashinSecurity, or Mastodon, or on the Smashing Security subreddit, and visit our website for more episodes.


Thanks:

Theme tune: "Vinyl Memories" by Mikael Manvelyan.

Assorted sound effects: AudioBlocks.



This podcast uses the following third-party services for analysis:

OP3 - https://op3.dev/privacy
...more
View all episodesView all episodes
Download on the App Store

Smashing SecurityBy Graham Cluley & Carole Theriault

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

308 ratings


More shows like Smashing Security

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,961 Listeners

Risky Business by Patrick Gray

Risky Business

363 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

634 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

369 Listeners

Hacked by Hacked

Hacked

176 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,011 Listeners

Click Here by Recorded Future News

Click Here

387 Listeners

Malicious Life by Malicious Life

Malicious Life

923 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,847 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

143 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

182 Listeners

Hacking Humans by N2K Networks

Hacking Humans

308 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

71 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

118 Listeners

Hacker And The Fed by Chris Tarbell & Hector Monsegur

Hacker And The Fed

159 Listeners