Naked Security

PODCAST · technology

Naked Security

We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!Got questions/suggestions/stories to share? Email: [email protected]: @NakedSecurityInstagram: @NakedSecurity

  1. 515

    S3 Ep149: How many cryptographers does it take to change a light bulb?

    Miss Manners confronts copy-and-paste. WinRAR patches bugs. When Airplane mode isn't. How many cryptographers to change a light bulb? Intro and outro music by Edith Mudge (www.edithmudge.com)

  2. 514

    S3 Ep148: Remembering crypto heroes

    Navajo Code Talkers Day. Beta bogosities. Skimming shenanigans. Hooligan hosting. A cybercrime conundrum. Intro and outro music by Edith Mudge (www.edithmudge.com)

  3. 513

    S3 Ep147: What if you type in your password during a meeting?

    An amazing Art Deco computer. Yet more performance-versus-security trouble. Is sound alone enough to sniff out your password? A rap song (of sorts) with a cybersecurity connection. Intro and outro music by Edith Mudge (www.edithmudge.com)

  4. 512

    S3 Ep146: Tell us about that breach! (If you want to.)

    Firefox fixes flaws. The exciting vulnerability that you don't need to be afraid of. Breach reporting rules with lots of leeway. Intro and outro music by Edith Mudge (www.edithmudge.com)

  5. 511

    S3 Ep145: Bugs With Impressive Names!

    Apple patches two zero-days, one for a second time. How a 30-year-old cryptosystem got cracked. All your secret are belong to Zenbleed. Remembering those dodgy PC/Mac ads. Intro and outro music by Edith Mudge (www.edithmudge.com)

  6. 510

    S3 Ep144: When threat hunting goes down a rabbit hole

    Why your Mac's calendar app says it's JUL 17. One patch, one line, one file. Careful with that {axe,file}, Eugene. Storm season for Microsoft. When typos make you sing for joy. Twitter: @NakedSecurity Intro and outro music by Edith Mudge (www.edithmudge.com)

  7. 509

    S3 Ep143: Supercookie surveillance shenanigans

    Remembering the slide rule. What you need to know about Patch Tuesday. Supercookie surveillance shenanigans. When bugs arrive in pairs. Apple's rapid patch that needed a rapid patch. User-Agent considered harmful. Twitter: @NakedSecurity Intro and outro music by Edith Mudge (www.edithmudge.com)

  8. 508

    S3 Ep142: Putting the X in X-Ops

    First there was DevOps, then SecOps, then DevSecOps. Or should that be SecDevOps? Paul Ducklin talks to Sophos X-Ops insider Matt Holdcroft about how to get all your corporate "Ops" teams working together, with cybersecurity correctness as a guiding light. Twitter: @NakedSecurity Intro and outro music by Edith Mudge (www.edithmudge.com)

  9. 507

    S3 Ep141: What was Steve Jobs's first job?

    PONG for one player. Apple pushes out <a href="https://nakedsecurity.sophos.com/2023/06/22/apple-patch-fixes-zero-day-kernel-hole-reported-by-kaspersky-update-now/ ">anti-spyware patch. Beware bad passwords on Linux servers. "Twitter hacker" gets 5 years. When mobile phones and dental hygiene collide. Twitter: @NakedSecurity Intro and outro music by Edith Mudge (www.edithmudge.com)

  10. 506

    S3 Ep140: So you think you know ransomware?

    Gee Whizz BASIC (probably). Think you know ransomware? Megaupload, 11 years on. ASUS warns of critical router bugs. MOVEit mayhem Part III. Twitter: @NakedSecurity Intro and outro music by Edith Mudge (www.edithmudge.com)

  11. 505

    S3 Ep139: Are password rules like running through rain?

    Magnetic core memory. Patch Tuesday and SketchUp shenanigans. More MOVEit mitigations. Mt. Gox back in the news. Gozi malware criminal imprisoned at last. Are password rules like running through rain? Twitter @NakedSecurity Intro and outro music by Edith Mudge (www.edithmudge.com)

  12. 504

    S3 Ep138: I like to MOVEit, MOVEit

    Calling all modems. KeePass gets an update. MOVEit gets pwned. Chromium zero-day. The backdoor that wasn't really. WPBT explained. Twitter @NakedSecurity Intro and outro music by Edith Mudge (www.edithmudge.com)

  13. 503

    S3 Ep137: 16th century crypto skullduggery

    How to say &quot;GIF&quot;. A Blackmailer-in-the-Middle attack. Knitting your own crypto. KeePass master password shenanigans. Binge listening. Email [email protected] Twitter @NakedSecurity Intro and outro music by Edith Mudge (www.edithmudge.com)

  14. 502

    S3 Ep136: Navigating a manic malware maelstrom

    Luminiferous aether. A $10m cybercrime reward. Bank scam kingpin gets 13 years. Three Apple 0-days. A Python malware maelstrom. Email [email protected] Twitter @NakedSecurity

  15. 501

    S3 Ep135: Sysadmin by day, extortionist by night

    An Apple product that flopped (and was not the Newton). Two-faced sysadmin jailed for 6 years. The smart plug with the unsmart security hole. Clearview AI again, once more, again. Intro and outro music by Edith Mudge (https://www.edithmudge.com). Hit us up on Twitter: @NakedSecurity

  16. 500

    S3 Ep134: It's a PRIVATE key - the hint is in the name!

    The world-changing Visible Calculator. How not to get a job. Private keys - the hint is in the name. Microsoft&#39;s complicated bootkit patch. Taming Bluetooth trackers. Email: [email protected] Twitter: https://twitter.com/nakedsecurity Original music by Edith Mudge (www.edithmudge.com)

  17. 499

    S3 Ep133: Apple takes "tight-lipped" to a whole new level

    New England gets BASIC. Google hits back at CryptBot crooks. Apple seals its lips on security. Mac malware-as-a-service. World Password Day. PaperCut: disclose or don&#39;t disclose? Original music by Edith Mudge (https://www.edithmudge.com).

  18. 498

    S3 Ep132: Proof-of-concept lets anyone hack at will

    The CIH or SpaceFiller virus revisited. Google&#39;s 2FA security shortcut. Server vulns under active attack. Two Chrome zero-days, but was it one attack? Email: [email protected] Twitter: @NakedSecurity

  19. 497

    S3 Ep131: Can you really have fun with FORTRAN?

    Fun with FORTRAN?! An extreme data breach and its consequences. Rogue 2FA apps live in action. Juicejacking revisited. With Doug Aamoth and Paul Ducklin. Original music by Edith Mudge.

  20. 496

    S3 Ep130: Open the garage bay doors, HAL

    A common business-oriented language. Patch Tuesday. Secure Boot (without the "Secure" part). Apple zero-days. World-readable garage doors. Motherboard malware threats. Original music by Edith Mudge (https://www.edithmudge.com) Email [email protected] Twitter @NakedSecurity

  21. 495

    S3 Ep129: When spyware arrives from someone you trust

    A supply chain attack that foisted spyware on trusting users. Wi-Fi encryption bypass via left-over data. Surely there should be TWO World Backup Days? Email [email protected] Original music by Edith Mudge (https://www.edithmudge.com) Twitter @NakedSecurity

  22. 494

    S3 Ep128: So you want to be a cybercriminal?

    RIP Gordon Moore, the more in Moore's Law. Photo cropping bugfix. DDoS honeypot. E-commerce patches. Apple 0-day and lots more. Email [email protected] Twitter @NakedSecurity

  23. 493

    S3 Ep127: When you chop someone out of a photo, but there they are anyway...

    The mobile phone bugs that Google kept quiet, just in case. The mysterious case of ATM video uploads. When redacted data springs back to life. Email [email protected] Twitter @NakedSecurity

  24. 492

    S3 Ep126: The price of fast fashion (and feature creep)

    The price of fast fashion. Firefox fixes. Feature creep fail curtailed in Patch Tuesday updates. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  25. 491

    S3 Ep125: When security hardware has security holes

    Memories of Michelangelo (the virus, not the artist). Data leakage bugs in TPM 2.0. Ransomware bust, ransomware warning, and anti-ransomware advice. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  26. 490

    S3 Ep124: When so-called security apps go rogue

    How Woz nearly gave away the Apple I. Rogue software packages. Rogue network "administrators". Rogue keyloggers. Rogue authenticators. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  27. 489

    S3 Ep123: Crypto company compromise kerfuffle

    The first search warrant for computer storage. GoDaddy breach. Twitter surprise. Coinbase kerfuffle. The cost of success. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  28. 488

    S3 Ep122: Stop calling every breach "sophisticated"!

    The birth of ENIAC. A "sophisticated attack" (someone got phished). A cryptographic hack enabled by a security warning. Valentine's Day Patch Tuesday. Apple closes spyware-sized 0-day hole. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  29. 487

    S3 Ep121: When cybercrime victims are culprits, too

    Cryptocurrency crimelords. Security patches for VMware, OpenSSH and OpenSSL. Medical breacher busted. Is that a bug or a feature? Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  30. 486

    S3 Special: Tracers in the Dark with Andy Greenberg

    Do we really need a "war against cryptography" - codes and ciphers that the government can easily crack if it thinks there's an emergency - to cement our collective online security? Hear renowned cybersecurity author Andy Greenberg's thoughtful commentary on this and many other vital issues, including anonymity and privacy, as we talk to him about his <a href="https://andygreenberg.net/ ">tremendous new book, Tracers in the Dark. Original music by Edith Mudge.

  31. 485

    S3 Ep120: When dud crypto simply won't let go

    The mighty CPU that wasn't. Hive ransomware takedown. Dutch data crime suspect busted. Samba finally gets rid of MD5. GitHub admits to an intrusion. Storing passwords securely. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  32. 484

    S3 Ep119: Breaches, patches, leaks and tweaks!

    The programming language almost called Oak. GoTo admits to more breach woes. T-Mobile spills 37 million records. Apple patches everything, even iOS 12. And Google mAkES tYpOs for sECurity.</p? Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  33. 483

    S3 Ep118: Guess your password? No need if it's stolen already!

    The HAPPY99 virus reminds us that less is more. Trouble with JSON Web Tokens. Investment scammers busted in Europe. The LifeLock "breach" that wasn't. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  34. 482

    S3 Ep117: The crypto crisis that wasn't (and farewell forever to Win 7)

    Two stories from the underground. Bank scammers busted. The crypto-crack that wasn't. And the end of two Windows eras at the same time. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  35. 481

    S3 Ep116: Last straw for LastPass? Is crypto doomed?

    The ground-breaking HP-35 digital calculator. Last straw for LastPass? Congress takes on quantum computing. 33 1/3-year-old cybersecurity lessons. Machine learning supply chain attack. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  36. 480

    S3 Ep115: True crime stories - A day in the life of a cybercrime fighter

    Once more unto the breach, dear friends, once more!&nbsp; Paul Ducklin talks to Peter Mackenzie, Director of Incident Response at Sophos, in a cybersecurity session that will alarm, amuse and educate you, all in equal measure.&nbsp; Original music by Edith Mudge Got questions/suggestions/stories to share?&nbsp; Email: [email protected]&nbsp; Twitter: @NakedSecurity&nbsp;

  37. 479

    S3 Ep114: Preventing cyberthreats - stop them before they stop you!

    Join world-renowned Sophos expert Fraser Howard, Director of Research at SophosLabs, for this fascinating episode, recorded during our recent Security SOS Week 2022. When it comes to fighting cybercrime, Fraser truly is a "specialist in everything", and he also has the knack of explaining this tricky and treacherous subject in plain English. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  38. 478

    S3 Ep113: Pwning the Windows kernel: the crooks who hoodwinked Microsoft

    The irony of the CAN-SPAM law. When genuine kernel drivers go rogue. Apple patches everything. Stealing data via secret radio waves. E-commerce supply chain drama. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  39. 477

    S3 Ep112: Beware! Data breaches can haunt you more than once...

    The worm that wasn't a Goner. LastPass suffers a sting in the data breach tail. Apple's secretive update. The Ping o' Death. SIM swapping explained. A Beatles-esque 0-day in Chrome and Edge. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  40. 476

    S3 Ep111: The business risk of a sleazy "nudity unfilter"

    Christmas-themed wormage. Prurient malware. Cryptorom busts. Voice call spoofing. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  41. 475

    S3 Ep110: Spotlight on cyberthreats - an expert speaks

    Security specialist John Shier tells you the "news you can really use" - how to boost your cybersecurity based on real-world advice from the 2023 Sophos Threat Report. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  42. 474

    S3 Ep109: How one leaked email password could drain your business

    Microsoft's tilt at the MP3 marketplace. Apple's not-a-zero-day emergency. Cracking the lock on Android phones. Browser-in-the-Browser revisited. The Emmenthal cheese attack. Business Email Compromise and how to prevent it. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  43. 473

    S3 Ep108: What would YOU do if you found $3 billion in a popcorn tin?

    Radio waves so mysterious they're known only as X-Rays. Were there six 0-days or only four? The cops that found $3 billion in a popcorn tin. Blue badge confusion. When URL scanning goes wrong. Tracking down every last unpatched file. Why even unlikely exploits can earn "high" severity levels. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  44. 472

    S3 Ep107: Eight months to kick out the crooks and you think that's GOOD?

    The man who put Boole in Boolean. OpenSSL's bated-breath update. Apple's zero-day finally settled. New Chrome zero-day. SHA-3 code gets a patch. Extreme extortion via stolen medical data. Data breach response the nonchalant way. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  45. 471

    S3 Ep106: Facial recognition without consent - should it be banned?

    Windows XP (fondly?!) remembered. Clearview AI courts controversy again. DEADBOLT ransomware crooks get counterhacked. Women cryptologists commemorated in US. How to measure randomness. Deconstructing Apple's latest security bulletins. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  46. 470

    S3 Ep105: WONTFIX! The MS Office cryptofail that "isn't a security flaw"

    Coolest videogame ever. Zoom thinks everyone's a developer. The Patch Tuesday that wasn't. A data breach coverup. Log4Shell all over again. And the Office cryptofail that Microsoft won't fix. Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  47. 469

    S3 Ep104: Should hospital ransomware attackers be locked up for life?

    What goes up... must come down. Ransomware criminal avoids a life sentence. Former CSO convicted over Uber megabreach coverup. WhatsApp fights rip-off rogue apps. The Countess of Computer Science. Could a weird email brick your iPhone? Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  48. 468

    S3 Ep103.5: OAuth 2 and why Microsoft is forcing you into it

    Naked Security meets Sophos X-Ops! Duck and Chet dig into OAuth 2.0, a well-known protocol for authorization. Microsoft calls it "Modern Auth", though it's a decade old, and is finally forcing Exchange Online customers to switch to it. Original music by Edith Mudge

  49. 467

    S3 Ep103: Scammers in the Slammer (and other stories)

    A fridge-sized calculator made with transistors (really). <a href="https://nakedsecurity.sophos.com/2022/09/30/urgent-microsoft-exchange-double-zero-day-like-proxyshell-only-different/ ">ProxyNotShell situation reviewed. Romance and BEC scammer gets 25 years in the slammer. Is there an answer to nuisance callers? Is the answer voicemail? Original music by Edith Mudge Got questions/suggestions/stories to share? Email [email protected] Twitter @NakedSecurity

  50. 466

    S3 Ep102.5: "ProxyNotShell" Exchange bugs - an expert speaks

    Chester Wisniewski gives you actionable advice on how to deal with two actively exploited Exchange zero-days that suddenly burst into the news. Learn who's affected and how, find out what you can do while waiting for Microsoft's patches, and plan your threat hunting in case the worst happens to you. Original music by Edith Mudge

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!Got questions/suggestions/stories to share? Email: [email protected]: @NakedSecurityInstagram: @NakedSecurity

HOSTED BY

Sophos

CATEGORIES

URL copied to clipboard!