logo
episode-header-image
May 2023
1h 16m

.ZIP domains, AI lies, and did social me...

Graham Cluley & Carole Theriault
About this episode

ChatGPT hallucinations cause turbulence in court, a riot in Wales may have been ignited on social media, and do you think .MOV is a good top-level domain for "a website that moves you"?

All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley.

Plus don't miss our featured interview with David Ahn of Centripetal.

Warning: This podcast may contain nuts, adult themes, and rude language.

Episode links:


Sponsored by:

  • Bitwarden – Password security you can trust. Bitwarden is an open source password manager trusted by millions of individuals, teams, and organizations worldwide for secure password storage and sharing.
  • Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. It’s Zero Trust for Okta. Watch a demo today!
  • Centripetal – Centripetal’s CleanINTERNET defends your assets from cyber threats by leveraging dynamic threat intelligence on a mass scale.

SUPPORT THE SHOW:

Tell your friends and colleagues about “Smashing Security”, and leave us a review on Apple Podcasts or Podchaser.

Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!

FOLLOW US:

Follow us on Twitter at @SmashinSecurity, or Mastodon, or on the Smashing Security subreddit, and visit our website for more episodes.


THANKS:

Theme tune: "Vinyl Memories" by Mikael Manvelyan.

Assorted sound effects: AudioBlocks.



This podcast uses the following third-party services for analysis:

OP3 - https://op3.dev/privacy
Up next
Jul 2
Surveillance, spyware, and self-driving snafus
A Mexican drug cartel spies on the FBI using traffic cameras and spyware — because "ubiquitous technical surveillance” is no longer just for dystopian thrillers. Graham digs into a chilling new US Justice Department report that shows how surveillance tech was weaponised to deadly ... Show More
34m 5s
Jun 25
Operation Endgame, deepfakes, and dead slugs
In this episode, Graham unravels Operation Endgame - the surprisingly stylish police crackdown that is seizing botnets, mocking malware authors with anime videos, and taunting cybercriminals via Telegram.Meanwhile, Carole exposes the AI-generated remote hiring threat. Could your ... Show More
54m 59s
Jun 18
The curious case of the code copier
A GCHQ intern forgets the golden rule of spy school — don’t take the secrets home with you — and finds himself swapping Cheltenham for a cell. Meanwhile, an Australian hacker flies too close to the sun, hacks his way into a US indictment, and somehow walks free... only to get boo ... Show More
32m 16s
Recommended Episodes
Mar 2021
This Is How They Tell Me the World Ends: The Cyber-Weapons Arms Race | Nicole Perlroth
In Episode 182 of Hidden Forces, Demetri Kofinas speaks with Nicole Perlroth, award-winning cybersecurity journalist for The New York Times and author of a recently published book on the cyber-weapons arms race titled “This Is How They Tell Me The World Ends.”   This is the lates ... Show More
59m 32s
Feb 2023
Voice Generating-AI Is Now the Plaything of 4Chan
AI has made the voice of Emma Watson say some very strange things, and 4Chan is to blame. But trolls playing with new machine-learning tools aren’t the only villain in this story. Actors are being asked to sign away the rights to their own voice for the purposes of AI reconstruct ... Show More
39 m
Jun 2021
RDV Tech 410 – Windows 11, entre controverses et grandes questions
Au programme :Windows 11 et les controverses : mise à jour et compatibilité, l’App Store, Teams intégré, focus sur le jeu vidéo et Gamepass…Le décès de John McAfeeLe point sur GamesStopNews et rumeurs : les évolutions du PlayStore, poster sur Instagram depuis un ordinateur, Premi ... Show More
1h 32m
Jun 2024
The US Sues Adobe, Tobacco-style Warnings, McDonald's Halts AI Drive-Thru, YouTube's Community Notes Test
In this episode of Discover Daily, we explore the latest developments in tech and social media. YouTube is testing a new feature called "notes" that allows users to add community-generated context to videos, providing additional information and clarifying when content may be outd ... Show More
5m 48s
Sep 2022
How To Protect Yourself From Social Engineering Hacks
Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ... Show More
29m 32s
Dec 2023
Kingdom come, kingdom fall.
German officials take down a dark web market. Google patched zero-day. Terrapin attack targets SSL. A look at payment fraud. Agent Tesla is spreading through an old vulnerability. An iPhone thief explains his techniques. Ukrainian reprisals for Russia's Kyivstar attack. Israeli o ... Show More
27m 44s
Jan 2024
Another day, another Blizzard attack.
Cozy Bear breaches Hewlett Packard Enterprise. An investigation reveals global surveillance based on digital advertising. Cisco patches critical vulnerabilities. Meta aims to enhance the online safety of minors.  iOS notifications are exploited for tracking. EquiLend’s systems go ... Show More
35m 32s
Jan 2021
Social Media Purge: The Urgent Need to Regulate Big Tech | Matt Stoller
In Episode 173 of Hidden Forces, Demetri Kofinas speaks with Matt Stoller, Director of Research at the American Economic Liberties Project and author of Goliath: The Hundred Year War Between Monopoly Power and Democracy. The two discuss the reaction of Big Tech to the storming of ... Show More
53m 22s
Feb 2019
Hybrid war and tactical influence operations. Separ lives off the land. NoRelationship attacks get past email filters. Responsible disclosure. Man-in-the-room bug. Ship hacking. Password managers.
In today’s podcast we hear about a test of influencing soldiers through their social media: Instagram works best, Twitter not so much. Separ credential-stealing malware successfully lives off the land. NoRelationship attacks get past some email filters. Spamming users to get your ... Show More
21m 33s