All Episodes
Naked Security — 515 episodes
S3 Ep149: How many cryptographers does it take to change a light bulb?
S3 Ep148: Remembering crypto heroes
S3 Ep147: What if you type in your password during a meeting?
S3 Ep146: Tell us about that breach! (If you want to.)
S3 Ep145: Bugs With Impressive Names!
S3 Ep144: When threat hunting goes down a rabbit hole
S3 Ep143: Supercookie surveillance shenanigans
S3 Ep142: Putting the X in X-Ops
S3 Ep141: What was Steve Jobs's first job?
S3 Ep140: So you think you know ransomware?
S3 Ep139: Are password rules like running through rain?
S3 Ep138: I like to MOVEit, MOVEit
S3 Ep137: 16th century crypto skullduggery
S3 Ep136: Navigating a manic malware maelstrom
S3 Ep135: Sysadmin by day, extortionist by night
S3 Ep134: It's a PRIVATE key - the hint is in the name!
S3 Ep133: Apple takes "tight-lipped" to a whole new level
S3 Ep132: Proof-of-concept lets anyone hack at will
S3 Ep131: Can you really have fun with FORTRAN?
S3 Ep130: Open the garage bay doors, HAL
S3 Ep129: When spyware arrives from someone you trust
S3 Ep128: So you want to be a cybercriminal?
S3 Ep127: When you chop someone out of a photo, but there they are anyway...
S3 Ep126: The price of fast fashion (and feature creep)
S3 Ep125: When security hardware has security holes
S3 Ep124: When so-called security apps go rogue
S3 Ep123: Crypto company compromise kerfuffle
S3 Ep122: Stop calling every breach "sophisticated"!
S3 Ep121: When cybercrime victims are culprits, too
S3 Special: Tracers in the Dark with Andy Greenberg
S3 Ep120: When dud crypto simply won't let go
S3 Ep119: Breaches, patches, leaks and tweaks!
S3 Ep118: Guess your password? No need if it's stolen already!
S3 Ep117: The crypto crisis that wasn't (and farewell forever to Win 7)
S3 Ep116: Last straw for LastPass? Is crypto doomed?
S3 Ep115: True crime stories - A day in the life of a cybercrime fighter
S3 Ep114: Preventing cyberthreats - stop them before they stop you!
S3 Ep113: Pwning the Windows kernel: the crooks who hoodwinked Microsoft
S3 Ep112: Beware! Data breaches can haunt you more than once...
S3 Ep111: The business risk of a sleazy "nudity unfilter"
S3 Ep110: Spotlight on cyberthreats - an expert speaks
S3 Ep109: How one leaked email password could drain your business
S3 Ep108: What would YOU do if you found $3 billion in a popcorn tin?
S3 Ep107: Eight months to kick out the crooks and you think that's GOOD?
S3 Ep106: Facial recognition without consent - should it be banned?
S3 Ep105: WONTFIX! The MS Office cryptofail that "isn't a security flaw"
S3 Ep104: Should hospital ransomware attackers be locked up for life?
S3 Ep103.5: OAuth 2 and why Microsoft is forcing you into it
S3 Ep103: Scammers in the Slammer (and other stories)
S3 Ep102.5: "ProxyNotShell" Exchange bugs - an expert speaks
S3 Ep102: Cutting through cybersecurity news hype
S3 Ep101: Uber and LastPass - is 2FA all it's cracked up to be?
S3 Ep100.5: Uber breach - an expert speaks
S3 Ep100: Browser-in-the-Browser hacking – how to spot an attack
S3 Ep99: TikTok "attack" - was there a data breach, or not?
S3 Ep98: The LastPass saga - should we stop using password managers?
S3 Ep97: A musical crash, ATM skimming, and was your iPhone pwned?
S3 Ep96: Zoom 0-day, AEPIC leak, Conti reward, heathcare security
S3 Ep95: Slack leak, Github onslaught, and post-quantum crypto
S3 Ep94: This sort of crypto (graphy), and the other sort of crypto (currency!)
S3 Ep93: Office security, data breach costs, and leisurely patches
S3 Ep92: Log4Shell4Ever, summer tips, and scammer timing
S3 Ep91: Code Red, OpenSSL, Java bugs and Office macros
S3 Ep90: Chrome 0-day again, True Cybercrime, and a 2FA bypass
S3 Ep89: Sextortion, blockchain blunder, and an OpenSSL bugfix
S3 Ep88: Phone scammers, hacking bust, and data breach fines
S3 Ep87: Follina, AirTags, ID theft and the Law of Big Numbers
S3 Ep86: The crooks were in our network for HOW long?!
S3 Ep85: Now THAT'S what I call a Microsoft Office exploit!
S3 Ep84: Government demand, Mozilla velocity, and Clearview fine
S3 Ep83: Cracking passwords, patching Firefox, and Apple vulns
S3 Ep82: Bugs, bugs, bugs (and Colonial Pipeline again)
S3 Ep81: Passwords (still with us!), Github, Firefox at 100, and network worms
S3 Ep80: Ransomware news, phishing woes, NAS bugs, and a giant hole in Java
S3 Ep79: Chrome hole, a bad-choice holiday, and cryptododginess
S3 Ep78: Darkweb hydra, Ruby, quantum computing, and a robot revolution
S3 Ep77: Bugs, busts and old-school PDP-11 hacking
S3 Ep76: Deadbolt, LAPSUS$, Zlib and a Chrome 0-day
S3 Ep75: Okta, CryptoRom, OpenSSL and CafePress
S3 Ep74: Cybercrime busts, Apple patches, Pi Day, and disconnect effects
S3 Ep73: Ransomware with a difference, dirty Linux pipes, and more
S3 Ep72: AirTag stalking, web server coding woes and Instascams
S3 Ep71: VMware escapes, PHP holes, WP plugin woes, and scary scams
S3 Ep70: Bitcoin, billing blunders, and 0-day after 0-day after 0-day
S3 Ep69: Wordpress woes, Wormhole holes, and a Microsoft change of heart
S3 Ep68: Bugs, scams, privacy... and fonts?!
S3 Ep67: Tax scams, carder busts and crypto capers
S3 Ep66: Cybercrime busts, wormable Windows, and the crisis of featuritis
S3 Ep65: Supply chain conniption, NetUSB hole, Honda flashback, FTC muscle
S3 Ep64: Log4Shell again, scammers keeping busy, and Apple Home bug
S3 Ep63: Log4Shell (what else?) and Apple kernel bugs
S3 Ep62: The S in IoT stands for security (and much more)
S3 Ep61: Call scammers, cloud insecurity, and facial recognition creepiness
S3 Ep60: Exchange exploit, GoDaddy breach and cookies made public
S3 Ep59: Emotet, an FBI hoax, Samba bugs, and a hijackable suitcase
S3 Ep58: Faces on Facebook, scams that pose as complaints, and a Kaseya bust
S3 Ep57: Europol v. Ransomware, Shrootless bug, and Linux browser flamewars
S3 Ep56: Cryptotrading rodent, ransomware hackback, and a Docusign phish
S3 Ep55.8: Purple teaming - learning to think like your adversaries
S3 Ep55.6: Cyberinsurance - help or hindrance?
S3 Ep55.4: Supply chain attacks and how to avoid them
S3 Ep55.2: Malware - the never-ending story
S3 Ep55: Live malware, global encryption, dating scams, and secret emanations
S3 Ep54: Another 0-day, double Apache patch, and Fight The Phish
S3 Ep53: Apple Pay, giftcards, cybermonth, and ransomware busts
S3 Ep52: Let's Encrypt, Outlook leak, and VMware exploit
S3 Ep51: OMIGOD a gaping hole, waybill scams, and Face ID hacked
S3 Ep50: Two 0-days plus another 0-day plus a fast food bug
S3 Ep49: Poison PACs, pointless alarms and phunky bugs
S3 Ep48: Cryptographic bugs, cryptocurrency nightmares, and lots (and lots) of phishing
S3 Ep47: Daylight robbery, spaghetti trouble, and mousetastic superpowers
S3 Ep46: Copyright scams, video snooping and Grand Theft Crypto
S3 Ep45: Routers attacked, hacking tool hacked, and betrayers betrayed
S3 Ep44: Unreported holes, retro computing, and tech support for malware
S3 Ep43: Apple 0-day, pygmy hippos, hive nightmares and Twitter hacker bust
S3 Ep42: Viruses, Nightmares, patches, rewards and scammers
S3 Ep41: Crashing iPhones, PrintNightmares, and Code Red memories
S3 Ep40: Kaseya breach, PrintNightmare 0-day, and hacking versus the law
S3 Ep39.5: A conversation with Eva Galperin
S3 Ep39: Paying the date, #SocialMediaDay tips, and a special splintersode
S3 Ep38: Clop busts, destructive Linux hacking, and rooted bicycles
S3 Ep37: Quantum crypto, refunding Bitcoins, and Alpaca problems
S3 Ep36: Trickbot coder busted, passwords cracked, and breaches judged
S3 Ep35: Apple chip flaw, Have I Been Pwned, and Covid tracker trouble
S3 Ep34: Apple bugs, scammers busted, and how crooks bypass 2FA
S3 Ep33: Eufy camera leak, Afterburner crisis, and AirTags (again)
S3 Ep32: AirTag jailbreak, Dell vulns, and the never-ending scam
S3 Ep31: Apple zero-days, Flubot scammers and PHP supply chain bug
S3 Ep30: AirDrop worries, Linux pests and ransomware truths
S3 Ep29: Anti-tracking, rowhammer problems and IoT vulns
S3 Ep28.5: Hacking back - is attack an acceptable form of defence?
S3 Ep28: Pwn2Own hacks, dark web hitmen and COVID-19 privacy
S3 Ep27: Census scammers, beg bounties and data breach fines
S3 Ep26: Apple 0-day, crypto vulnerabilities and PHP backdoor
S3 Ep25: Drained accounts, ransomware attacks and Linux badware
S3 Ep24: How not to get snooped, scammed or hoaxed
S3 Ep23.5: An interview with cybersecurity expert John Noble CBE
S3 Ep23: Hafnium happenings, I see you, and Pythonic poison
S3 Ep22: Cryptographic escapes and social media scams
S3 Ep21: Cryptomining clampdown, the 100-ton man, and ScamClub ads
S3 Ep20: Corporate megahacking, true love gone bad, and tax grabs
S3 Ep19.5: How NOT to be a bug bounty hunter
S3 Ep19: Chrome zero-day, coffee hacking and Perl.com stolen
S3 Ep18: Apple emergency, crypto blunder and botnet takedown
S3 Ep17: Facemasks, hidden ads and paranormal hacking
S3 Ep16: Darkweb bust, security at home, and browser snoopage
S3 Ep15.5: Home schooling - how to stay secure
S3 Ep15: Titan keys, Mimecast certs and Solarwinds
S3 Ep14: Money scams, HTTPS by default, and hardcoded passwords
S3 Ep13: A chat with hacker Keren Elazari
S3 Ep12: A chat with social engineering hacker Rachel Tobac
S3 Ep11: DIY phishes, sandwich scams and vaccine hacking
S3 Ep10.5: 20 years of cyberthreats that shaped infosec
S3 Ep10: Hacking iPhones, sunken Enigmas and double scams
S3 Ep9: Gift card hacks, dubious doorbells and Wi-Fi tips
S3 Ep8: A conversation with Katie Moussouris
S3 Ep7: When ransomware crooks get a big fat zero!
S3 Ep6: How not to get scammed
S3 Ep5: Chrome, Flash and malware for sale
S3 Ep4.5: FBI "ransomware warning" for healthcare is a warning for everyone
S3 Ep4: Facebook scams, vishing, and smartphone privacy tips
S3 Ep3: Breaking crypto, busting hackers and pwning Chrome
S3 Ep2: Creepy smartwatches, botnets and Pings of Death
S3 Ep1: Ransomware - is it really OK to pay?
S3 Trailer: We're back!
S2 Ep42: Apple auth attack, Octopus Scanner, Escobar escapades
S2 Ep41: Super-sized ransomware, FBI v Apple and AirPods hot or not
S2 Ep40: Demonic printers, a sleazy stalker and 10 reasons to patch
S2 Ep39: Thunderspy, government encryption, and reply all mistakes
S2 Ep38: Crashing iPhones, ransomware tales and human chatbots
S2 Ep37: Microsoft fixes, airgap fun and free games for 2FA
S2 Ep36: Rogue Chrome extensions, Signal fears and Darth Vader
S2 Ep35: TikTok woes, sextortion scams and passwords vs. single sign-on
S2 Ep34: Can you trust hackers on how not to get hacked?
S2 Ep33: Ransomware on sale, dark web disaster, dead drops and pillow forts
S2 Ep32: ZoomBombing, Android malware and the WhatsApp Martinelli hoax
S2 Ep31: Remote working, malwareless ransomware and EARN IT
S2 Ep30: Let's Encrypt, ULTRASONIC attacks and ransomware in your backups
IWD: Biometrics, machine learning, privacy and being a woman in tech
S2 Ep29: Facial recognition, malware madness and smart speakers
S2 Ep28: Stalkerware, when cybercrooks return, and phishing gone wild
S2 Ep27: Bluetooth vulnerabilities, dodgy Chrome extensions and forgotten encryption passwords
S2 Ep26: Robbin Hood ransomware, Twitter parodies and SMS 2FA WHAT?
S2 Ep25: You've seen WHAT on public Trello boards?
S2 Ep24: Tinder, angry customers and weleakinfo takedown
S2 Ep23: Snake ransomware, VPN vulnerabilities and is your phone listening to you?
S2 Ep22: Word doc stops fraud, bye bye Python 2, latest from the ransomware swamp
S2 Ep21 - Plundervolt, domain name gunfight and Facebook snubs Congress
S2 Ep20 - Why don't they send ransomware on floppies anymore?
S2 Ep19 - One of us just prevented a ransomware attack
S2 Ep18 – Missing cryptoqueen, festive phishing and can the web be saved?
S2 Ep17 - Fake AirBnBs, lying ISPs and a glance at the cyberfuture
S2 Ep16 - BlueKeep's back, ransomware batters Spain, and yet more sextortion
S2 Ep15 - City under attack! VPN hacked, floppies nixed
S2 Ep14 - Samsung fingerprint fail, mystery black boxes and invisible Android apps
S2 Ep13.5 - All about social media: Growing up online, parent advice and social shaming
S2 Ep13 - Weird Android zero-day and other tech fails
S2 Ep12 - Dark Web, O.MG Cable spying and securing new laptops
S2 Ep11 - Fleeceware, Chrome bug and the sextortion scam that won't die
S2 Ep10 – Emotet’s back, mutant WannaCry and Insta scam
S2 Ep9 - Wikipedia down, Firefox VPN and NetCAT attacks
S2 Ep8 - Facebook Phone Leak, $5m Ransoms And DNS Controversy
S2 Ep7 - iPhones attacked, Twitter hack and set-top box Android botnet
S2 Ep6 - Instagram phishing, jailbreaking iPhones and social media hoaxes
S2 Ep5 - Phishing, eavesdropping voice assistants and quick fire questions
S2 Ep4 - iPhone holes, Android malware and romance scams
S2 Ep3 - Ransomware, surveillance and data theft
S2 Ep2 - EvilGnome, leaky browser add ons and the latest on BlueKeep
S2 Ep1 - FaceApp, logic bombs and youngsters' online safety
S2 Launch - RDP Exposed
Ep. 028 - SPEWS, Android security and scary Facebook messages
Ep. 027 - Honeypots, GPS rollover and the MySpace data vortex
Ep. 026 - Android bloatware, hackable routers and website attacks
Ep. 025 - Business Email Compromise and IoT surprises
Ep. 024 - Sextortion, malicious adverts and randomness explained
Ep. 023 - Facebook promises and Google Chrome patches
Ep. 022 - Plaintext passwords, cryptocoin criminality and the Momo monstrosity
Ep. 021 - Leaked calls, a virus on the loose and passwords on display
Ep. 020 - Leaky containers, careless coders and risky USB cables
Ep. 019 - Android holes, iOS screengrabbing and USB poo
Ep. 018 - Home invasions, snoopy apps and Android versus iOS
Ep. 017 - DNS hijacking, a weird breach and a cybersecurity confession
Ep. 016 - Email fraud, Android insecurity, Collection #1 and the 10 Year Challenge
Ep. 015 - USB anti-hacking, bypassing 2FA and government insecurity
Ep. 014 - Rickrolls, Acrobat and zombie hands
Ep. 013 - Breaches, Facebook and ransomware reinvented
Ep. 012 - WordPress worms, Android fraud and Flash fails
Ep. 011 - Marriott, Kubernetes and PewDiePie
Ep. 010 - Big breach, Creep-O-Meter and Black Friday
Ep. 009 - Competitive hacking, threat report and crazy tweets!
Ep. 008 - PortSmash, iPhones and cryptocoins
Ep. 007 - Cryptojacking, coding and cyberawareness
Ep. 006 - WhatsApp, rogue scripts and sextortion
Ep. 005 - Facebook, breaches and phones
Mobile security – how to have your cake and eat it
Privacy - can you have too much of a good thing?
Trends in malware - ransomware, cryptojacking, what next?
Don't take fright - get web security right
Welcome to the wonderful world of GDPR! Where next?
"WannaCrypt" ransomware scam widely spammed out
Chet Chat 271 - June 14, 2018
Chet Chat 270 - June 7, 2018
FBI issues bulletin about "VPNFilter" malware
Ep. 004 - Email EFAIL, Linux bugs and sniffer dogs
Chet Chat 269 - May 18, 2018
Chet Chat 268 - May 10, 2018
Ep. 003 - Malware, patching and Facebook privacy
Ep. 002 - Passwords, cracking and HTTPS
Ep. 001 - Mining + hijacking = cryptojacking
Chet Chat 267 - December 7, 2017
Chet Chat 266 - December 2, 2017
Chet Chat 265 - November 3, 2017
Chet Chat 264 - October 20, 2017
Chet Chat 263 - October 6, 2017
Chet Chat DEF CON 25 - July 30, 2017
Ransomware revisited – is it really the worst sort of malware?
Botnets – the malware that makes you part of the problem
Surveillance - when does security turn into snooping?
Phishing – how this troublesome crime is evolving
GDPR – Burden or opportunity? Cost or value?
Chet Chat 262 - June 7, 2017
Chet Chat 261 - May 26, 2017
Chet Chat 260 - Mar 17, 2017
BSides Vancouver 2017 - Interview with Yubico about multifactor authentication
Chet Chat 259 - Mar 8, 2017
Chet Chat 258 - Feb 16, 2017
RSA 2017 - Day 3 - Roving report
RSA 2017 - Day 2 - Roving report
RSA 2017 - Day 1 - Roving report
Chet Chat 257 - Jan 27, 2017
Chet Chat 256 - Jan 6, 2017
Chet Chat 255 - Nov 18, 2016
Chet Chat 254 - Oct 7, 2016
Chet Chat 253 - Sep 30, 2016
Chet Chat 252 - Sep 23, 2016
Chet Chat 251 - Aug 31, 2016
Chet Chat 250 - Aug 11, 2016
Chet Chat 249 - Aug 6, 2016
Chet Chat 248 - July 29, 2016
Chet Chat 247 - July 21, 2016
Chet Chat 246 - July 14, 2016
Chet Chat 245 - July 8, 2016
Chet Chat 244 - July 1, 2016
Chet Chat 243 - June 24, 2016
Chet Chat 242 - June 18, 2016
Chet Chat 241 - May 21, 2016
Chet Chat 240 - May 13, 2016
Chet Chat 239 - Apr 28, 2016
Interview with Mark Loman on CryptoGuard
Chet Chat 238 - Mar 31, 2016
Chet Chat 237 - Mar 24, 2016
Chet Chat 236 - Mar 18, 2016
Chet Chat 235 - Mar 10, 2016
Chet Chat 234 - Mar 3. 2016
Chet Chat 233 - Feb 25, 2016
Chet Chat 232 - Feb 18, 2016
Chet Chat 231 - Feb 12, 2016
Chet Chat 230 - Feb 4, 2016
Chet Chat 229 - Jan 27, 2016
Chet Chat 228 - Jan 22, 2016
Chet Chat 227 - Jan 13, 2016
Chet Chat 226 - Jan 6, 2016
Chet Chat 225 - Dec 31, 2015
Chet Chat 224 - Dec 1, 2015
Chet Chat 223 - Nov 25, 2015
Chet Chat 222 - Nov 19, 2015
Chet Chat 221 - Nov 12, 2015
Chet Chat 220 - Nov 4, 2015
Chet Chat 219 - Oct 21, 2015
Chet Chat 218 - Oct 14, 2015
Chet Chat 217 - Oct 7, 2015
Chet Chat 216.5 - Oct 2, 2015
Chet Chat 216 - Sep 30, 2015
Chet Chat 215 - Sep 23, 2015
Chet Chat 214 - Sep 16, 2015
Chet Chat 213 - Sep 9, 2015
Chet Chat 212 - Sep 2, 2015
Chet Chat 211 - Aug 12, 2015
Chet Chat 210.5 - Aug 7, 2015
Chet Chat 210 - Aug 5, 2015
Chet Chat 209 - July 29, 2015
Chet Chat 208 - July 23, 2015
Chet Chat 207 - July 17, 2015
Chet Chat 206 - July 7, 2015
Sophos Techknow - Malware on Linux: When Penguins Attack
Chet Chat 205 - July 1, 2015
Chet Chat 204 - June 24, 2015
Chet Chat 203 - June 18, 2015
Chet Chat 202 - June 12, 2015
Infosec 2015: "What concerns you the most in computer security?"
Chet Chat 201 - June 3, 2015
Chet Chat 200 - May 28, 2015
Chet Chat 199 - May 20, 2015
Chet Chat 198 - May 14, 2015
Chet Chat 197 - May 6, 2015
Chet Chat 196 - Apr 30, 2015
Chet Chat 195.5 - Apr 22, 2015
Chet Chat 195 - Apr 21, 2015
Chet Chat 194 - Apr 17, 2015
Chet Chat 193 - Apr 8, 2015
Chet Chat 192 - Mar 31, 2015
Chet Chat 191 - Mar 25, 2015
Chet Chat 190 - Mar 18, 2015
Chet Chat 189 - Mar 11, 2015
Chet Chat 188 - Mar 4, 2015
Chet Chat 187 - Feb 25, 2015
Chet Chat 186 - Feb 18, 2015
Chet Chat 185 - Feb 12, 2015
Chet Chat 184 - Feb 4, 2015
Chet Chat 183 - Jan 28, 2015
Chet Chat 182 - Jan 21, 2015
Chet Chat 181 - Jan 15, 2015
Chet Chat 180 - Jan 7, 2015
Chet Chat 179 - Dec 31, 2014
Chet Chet 178 - Dec 24, 2014
Chet Chat 177 - Dec 17, 2014
Chet Chat 176 - Dec 4, 2014
Chet Chat 175 - Nov 26, 2014
Sophos Techknow - Dealing with Ransomware
Chet Chat 174 - Nov 19, 2014
Chet Chat 173 - Nov 12, 2014
Chet Chat 172 - Nov 5, 2014
Chet Chat 171 - Oct 29, 2014
Chet Chat 170 - Oct 21, 2014
Chet Chat 169 - Oct 15, 2014
Chet Chat 168 - Oct 8, 2014
Chet Chat 167 - Oct 2, 2014
Chet Chat 166.5 - Sep 26, 2014
Chet Chat 166 - Sep 25, 2014
Chet Chat 165 - Sep 17, 2014
Chet Chat 164 - Sep 10, 2014
Chet Chat 163 - Sep 3, 2014
Chet Chat 162 - Aug 29, 2014
Chet Chat 161 - Aug 20, 2014
Chet Chat 160 - Aug 13, 2014
Chet Chat 159.5 - Aug 9, 2014
Chet Chat 159 - Aug 6, 2014
Chet Chat 158 - July 30, 2014
Chet Chat 157 - July 23, 2014
Sophos Techknow - Firewalls Demystified
Chet Chat 156 - July 16, 2014
Chet Chat 155 - July 10, 2014
Chet Chat 154 - July 3, 2014
Chet Chat 153 - June 25, 2014
Chet Chat 152 - June 19, 2014
Chet Chat 151 - June 11, 2014
Chet Chat 150 - June 4, 2014
TrueCrypt - What happened and what comes next
Chet Chat 149 - May 28, 2014
Chet Chat 148 - May 21, 2014
Chet Chat 147 - May 14, 2014
Chet Chat 146 - May 7, 2014
Chet Chat 145 - Apr 29, 2014
Chet Chat 144 - Apr 23, 2014
Chet Chat 143 - Apr 16, 2014
Chet Chat 142 - Apr 10, 2014
Chet Chat 141 - Apr 2, 2014
Security in Verse - Apr 1, 2014
Chet Chat 140 - Mar 26, 2014
Chet Chat 139 - Mar 20, 2014
Chet Chat 138 - Mar 13, 2014
Chet Chat 137 - Mar 5, 2014
Chet Chat 136.5 - Feb 27, 2014
Chet Chat 136 - Feb 25, 2014
Chet Chat 135 - Feb 19, 2014
Chet Chat 134 - Feb 11, 2014
Chet Chat 133 - Feb 4, 2014
Chet Chat 132 - Jan 28, 2014
Chet Chat 131 - Jan 22, 2014
Wikileaks - the lessons behind the drama
Chet Chat 130 - Jan 14, 2014
Sophos Techknow - Botnets and zombie malware explained
Chet Chat 129 - Jan 7, 2014
Chet Chat 128 - Dec 31, 2013
Chet Chat 127 - Dec 24, 2013
Sophos Security Threat Report 2014
Chet Chat 126 - Dec 2, 2013
Chet Chat 125 - Nov 26, 2013
Avoiding fake support calls
Chet Chat 124 - Nov 20, 2013
Sophos Techknow - The End of XP
Chet Chat 123 - Nov 13, 2013
Chet Chat 122 - Nov 7, 2013
Chet Chat 121 - Oct 28, 2013
Chet Chat 120 - Oct 22, 2013
Sophos Security Chet Chat - Episode 119.5 - October 16, 2013
Sophos Security Chet Chat - Episode 119 - October 7, 2013
Sophos Security Chet Chat - Episode 118.99 - October 4, 2013
Sophos Security Chet Chat - Episode 118.66 - October 3, 2013
Sophos Security Chet Chat - Episode 118.33 - October 2, 2013
Sophos Security Chet Chat - Episode 117 - September 24, 2013
Sophos Techknow - Understanding vulnerabilities
Sophos Security Chet Chat - Episode 116 - September 10, 2013
Sophos Security Chet Chat - Episode 115 - August 27, 2013
Sophos Security Chet Chat - Episode 114 - August 13, 2013
Sophos Security Chet Chat - Episode 113 - July 19, 2013
Sophos Security Chet Chat - Episode 112 - July 3, 2013
Sophos Security Chet Chat - Episode 111 - June 17, 2013
Sophos Security Chet Chat - Episode 110 - June 4, 2013
Sophos Security Chet Chat - Episode 109 - May 20, 2013
Sophos interview with "We are Anonymous" author Parmy Olson
Sophos Security Chet Chat - Episode 108 - May 8, 2013
Sophos Security Chet Chat - Episode 107 - April 23, 2013
Sophos Techknow - Two-factor authentication
Sophos Security Chet Chat - Episode 106 - April 9, 2013
Sophos Security Chet Chat - Episode 105 - March 22, 2013
Sophos Security Chet Chat - Episode 104.5 - March 22, 2013
Sophos Security Chet Chat - Episode 104 - March 12, 2013
Sophos Security Chet Chat - Episode 103 - February 24, 2013
Sophos Security Chet Chat - Episode 102 - February 12, 2013
What is the Anatomy of an Attack event?
Sophos Security Chet Chat - Episode 101 - January 30, 2013
Sophos Security Chet Chat - Episode 100 - December 10, 2012
Sophos Security Chet Chat - Episode 99 - October 31, 2012
Sophos Security Chet Chat - Episode 98 - September 17, 2012
Sophos Security Chet Chat - Episode 97 - August 10, 2012
Sophos Techknow - All about Java
Sophos Security Chet Chat - Episode 96 - August 3, 2012
Sophos Techknow - Understanding SSL
Sophos Security Chet Chat - Episode 95 - July 19, 2012
Sophos TechKnow - Patching: should you lead, follow, or get out of the way?
Sophos Security Chet Chat - Episode 94 - July 13, 2012
Sophos Security Chet Chat - Episode 93 - June 21, 2012
Sophos Security Chet Chat - Episode 92 - June 5, 2012
Sophos Security Chet Chat - Episode 91 - May 18, 2012
Sophos Security Chet Chat - Episode 90 - May 10, 2012
Sophos Security Chet Chat - Episode 89 - April 26, 2012
Sophos Security Chet Chat - Episode 88 - April 17, 2012
Sophos Security Chet Chat - Episode 87 - April 5, 2012
Sophos Security Chet Chat - Episode 86 - March 31, 2012
Sophos Security Chet Chat - Episode 85 - March 22, 2012
Sophos Techknow - Busting Password Myths
Sophos Security Chet Chat - Episode 84.66 - March 2, 2012
Sophos Security Chet Chat - Episode 84.33 - February 28, 2012
Sophos Security Chet Chat - Episode 84 - February 23, 2012
Sophos Security Chet Chat - Episode 83 - February 16, 2012
A time-based analysis of Rich Text Format manipulations
Sophos Security Chet Chat - Episode 82 - February 3, 2012
Sophos Security Chet Chat - Episode 81 - January 23, 2012
Sophos Security Chet Chat - Episode 80 - January 18, 2012
Sophos Security Chet Chat - Episode 79 - January 9, 2012
Sophos Security Chet Chat - Episode 78 - December 20, 2011
Sophos Security Chet Chat - Episode 77 - November 24, 2011
Sophos Security Chet Chat - Episode 76 - October 21, 2011
Sophos Security Chet Chat - Episode 75 - October 14, 2011
Interview with Brad Arkin from Adobe about Flash Player 11 and Reader security
Sophos Security Chet Chat - Episode 74 - September 30, 2011
Sophos Security Chet Chat - Episode 73 - September 18, 2011
Sophos Security Chet Chat - Episode 72 - September 8, 2011
Sophos Security Chet Chat - Episode 71 - August 21, 2011
Sophos Security Chet Chat - Episode 70 - August 11, 2011
Sophos Security Chet Chat - Episode 69 - July 28, 2011
Sophos Security Chet Chat - Episode 68 - July 22, 2011
Sophos Security Chet Chat - Episode 67 - July 15, 2011
Sophos Security Chet Chat - Episode 66 - July 7, 2011
Sophos Security Chet Chat - Episode 65 - June 23, 2011
Sophos Security Chet Chat - Episode 64 - June 15, 2011
Sophos Security Chet Chat - Episode 63 - June 9, 2011
Sophos Security Chet Chat - Episode 62 - June 2, 2011
Sophos Security Chet Chat - Episode 61 - May 27, 2011
Sophos Security Chet Chat - Episode 60 - May 19, 2011
Sophos Security Chet Chat - Episode 59 - May 6, 2011
Sophos Security Chet Chat - Episode 58 - April 30, 2011
Sophos Security Chet Chat - Episode 57 - April 23, 2011
Sophos Security Chet Chat - Episode 56 - April 12, 2011
Sophos Security Chet Chat - Episode 55 - April 6, 2011
Sophos Security Chet Chat - Episode 54 - March 31, 2011
Sophos Security Chet Chat - Episode 53 - March 21, 2011
Sophos Security Chet Chat - Episode 52 - March 15, 2011
Sophos Security Chet Chat - Episode 51 - March 7, 2011
Sophos Security Chet Chat - Episode 50 - February 28, 2011
Sophos Security Chet Chat - Episode 49 - February 21, 2011
Sophos Security Chet Chat - Episode 48 - February 16, 2011
Sophos Security Chet Chat - Episode 47 - February 7, 2011
Sophos Security Chet Chat - Episode 46 - January 31, 2011