Think before you shrink! And our guest is faked

Think before you shrink! And our guest is fak...

Up next

When 2G attacks, and a romantic road trip goes wrong

In this episode, Graham warns why it is high time we said goodbye to 2G - the outdated mobile network being exploited by cybercriminals with suitcase-sized SMS blasters. From New Zealand to London, scammers are driving around cities like dodgy Uber drivers, spewing phishing texts ...  Show more

Choo Choo Choose to ignore the vulnerability

In episode 426 of the "Smashing Security" podcast, Graham reveals how you can hijack a train’s brakes from 150 miles away using kit cheaper than a second-hand PlayStation. Meanwhile, Carole investigates how Grok went berserk, which didn't stop the Department of Defense signing a ...  Show more

Recommended Episodes

Another day, another Blizzard attack.
CyberWire Daily

Cozy Bear breaches Hewlett Packard Enterprise. An investigation reveals global surveillance based on digital advertising. Cisco patches critical vulnerabilities. Meta aims to enhance the online safety of minors.  iOS notifications are exploited for tracking. EquiLend’s systems go ...  Show more

How To Protect Yourself From Social Engineering Hacks
CYBER

Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ...  Show more

Thu. 10/24 - Is TikTok A “National Security Risk?”
Tech Brew Ride Home

Is TikTok a national security risk? Inquiring Senators want to know. Earnings running the gamut from bad to surprisingly good from Twitter, Amazon and Tesla. And to paraphrase an old saw: if a voicemail system goes down how would anyone even notice? Sponsors: Mealime LegalForc ...  Show more

Kingdom come, kingdom fall.
CyberWire Daily

German officials take down a dark web market. Google patched zero-day. Terrapin attack targets SSL. A look at payment fraud. Agent Tesla is spreading through an old vulnerability. An iPhone thief explains his techniques. Ukrainian reprisals for Russia's Kyivstar attack. Israeli o ...  Show more