
Kalashnikov unveils its “smart” shotgun, San Diego struggles with its street lights, and a researcher reveals how he found a way to hack every Tesla on the planet.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by David McClelland.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
This week, special mention goes to Alex Amarth, John Morris, Phil, Timothy Prindle, Aisha Kenmori Bish, Azam Shad, Sriram Datar, Danielle Kromek, Simon Cook, and Christopher Bonney.
Now I think it is incredibly cool how diverse and international all our Patreon supporters sound. But I gotta say, I'm not seeing a lot of girl names.
God, I'd love to see a few girl names here. That said, I love you boys. I love you all. Thank you so much for supporting Smashing Security.
If you want to join this incredible club of people, check out our Patreon information and smashingsecurity.com/patreon. Okay, let's get this show on the road.
And what they were able to do was not only a denial of service attack against the rifle to prevent it from shooting, but they could even get it to deliberately miss its target.
So you'd have something in the aim, but the actual gun itself would fire slightly askew. They even managed to hit the target next to the one they were aiming for.
Hello, hello, and welcome to Smashing Security, Episode 196. My name's Graham Cluley.
Although kind of exactly what they're going to announce is a little bit up for debate and we'll find out in a few hours' time as of the time of recording.
And by the time anyone listens to this, it'll be all over the tech websites. So what would be nice is, can you give us your predictions?
Then we can judge you next episode on your success. What do you think Cupertino is going to announce?
So there's definitely, definitely, there's a very high confidence rate that there's going to be at least one new watch type device, probably a Series 6 Apple Watch of some description, and possibly a lower-end one as well.
I say lower-end, something to compete with the likes of Fitbit, you know, in the kind of like £100-£200-odd category. So something like that.
We also think there's going to be some new iPad announcements as well, but probably what may steal the headlines— and again, I'm saying this with the event being 4 hours away, and by the time this comes out, everyone will know whether I'm right or wrong already— but probably I think the big news will be what isn't announced.
We don't think the next iPhone is going to be announced yet.
Now, every year at this time of year, beginning of September, for the last goodness knows how many years, this has been the point at which Apple shows off its brand new smartphone.
But it already said it's going to be a few weeks late with it for obvious reasons this year. So we think that it's not going to announce or fully reveal the iPhone.
I suspect that there will be a tease of it and there will be a follow-up event either later in September or beginning of October because it's a virtual event.
They're not having really anybody there. It's all being filmed in advance, we presume. So it doesn't really cost them loads more money in terms of flying journalists over.
It's just an extra bit of filming on their part. So, you know, the more anticipation they can build up, all the better it is for their PR machine.
Apple's going big on trying to make more money from the ones and zeros that it sells, so it might bundle up some stuff this year in terms of games and movies and whatever.
So, yeah, watch this space, or if you're listening to this later on this week, you've already watched this space and you'll find out how inaccurate I am.
Dave musks up and gives us a Tesla lesson. And I delve into the twisty turny smart streetlights snafu that happened in San Diego. This is crazy.
All this and much more coming up on this episode of Smashing Security.
The last thing really he's gonna have is dirty great big jingle bells on his sleigh waking all the kids up. So I've always wondered that.
So I was being interviewed by the lovely Stuart Sumner, who was the editor of Computing magazine at the time.
I had all of the facts and figures that we painstakingly researched about how fast Santa would have to be to go around the world, about the big data operation and analytics to make sure that, you know, it was all just-in-time delivered by the elves.
It was a fascinating story.
For the man or woman who's had everything in the past, you will soon be able to grab a Kalashnikov smart shotgun, MP155 Ultima.
Anyway, this Russian-made gun offers synchronization, as I said, with all your gadgets and gizmos.
Yes, it's actually quite difficult to get a Wi-Fi signal as well, but this thing will connect via Wi-Fi and Bluetooth. It's got a USB Type-C port. How cool is that?
And that will be for connecting to a full high definition camera. So FHD, you must know about that kind of thing.
With all these cameras attached to it, because Russians do love their dashcams, don't they? They love to film as they're driving around.
And more and more people around the world actually are doing that, aren't they? Whether it be on bicycles while they're cycling around or from their cars as well.
Well, and now this actually, although it claims to be one of the very first smart guns, I've done a little bit of digging around and I found this isn't the first smart gun because there are other guns which have been Wi-Fi enabled.
And in some cases, there are companies who've even been developing smart bullets, which use guidance systems and computers to hit their targets.
There is a company in the States called TrackingPoint, and TrackingPoint say that all you have to do is pull the trigger and their guns will automatically acquire the target.
They will track the target. And it quotes what it calls its TTK value, which is its total time to kill of approximately 2.5 seconds.
Now, I think these are primarily being used by hunters. Just to prove how easy it is to do this, they have a video of a guy who's obviously an army veteran who was blinded.
And he uses a TrackingPoint gun to shoot a deer, but he doesn't know what he's pointing at, obviously.
This thing called TrackingPoint, it's an entire weapons system with a set of optics. For me, it enables me to hunt.
And I remembered that back in 2015, because I wrote a story about it at the time, in 2015, Wired, a couple of their reporters got hold of one of these TrackingPoint guns, and they found that they could hack it remotely via Wi-Fi.
And what they were able to do was not only a denial of service attack against the rifle to prevent it from shooting, but they could even get it to deliberately miss its target.
So you'd have something in the aims, but the actual gun itself would fire slightly askew. They even managed to hit the target next to the one they were aiming for.
It certainly wouldn't be easy to patch if you're out on the field, would it?
It just seems a bit crazy for me how much IoT and technology is integrating itself into everything.
And if you have guns which are so computerised and able to guide and able to self-select and basically so good at shooting that a blind person can use them with 100% success, where is the pleasure, if there indeed is any pleasure, from hunting?
And where is the skill?
And this is particularly with regards to guns that employ some kind of authentication built into them so that only an approved, authorized person is able to use that gun.
So, for example, a gun that is stolen cannot be used by a criminal.
A gun that is stolen from a law enforcement officer can only be used were it to be repatriated with that law enforcement officer, or accidental shootings can't take place as well.
And I was reading around, there are some states where laws had actually been proposed that gun shops would have to sell a selection of smart guns with, whether it's a fingerprint reader or something.
And some German firms came up with these, but they've reached kind of a bit of an impasse, really, and not been able to get any traction in the United States due to some pretty severe lobbying from the NRA.
Now, I'm not going to get too much into the politics of guns and stuff, at risk of alienating too much of your listenership.
But it does seem as though some of these ways to make guns safer, if that is even a thing, do seem to be being shot down before they're given a chance to be proved successful.
So I've been listening to the show over the last few weeks because I'm genuinely a fan as well as a guest, and listening to John and Jess, I've been listening to them speaking with interest about how connected cars continue to creep into the conversation around cybersecurity.
Now, I'm not what you would call a petrolhead, but I have become a bit of an EV nut, if I'm honest.
I have found a sneaky angle, whereas if I come in at about 45 degrees and ride the curb next door to the dipped curb outside my drive, I can get my car on there.
I have trouble getting it off again. But anyway, that's another story. So I have developed an affinity with and a bit of a passion for electric vehicles.
And it's also become a bit more of my day job as well, talking and writing about this stuff and this convergence of consumer tech, connected cars, and electric vehicles, and what the potential ramifications of that may be.
So my interest was piqued when I came across this story last week.
And it's not about hacking a single car, but instead about how a hacker, a tinkerer really, was able to compromise Tesla's mothership servers and gain remote access to, and be able to control Tesla's entire fleet of cars.
Well, okay, so this actually happened, for full disclosure, about 3 years ago, but the story's only just gone public after the hacker, one Jason Hughes, or WK057 as he goes by.
He shared online a vulnerability report that he sent to Tesla engineers. And I've shared a Google Doc of that report with some excellent explanatory notes that are very revealing.
And there's also a good write-up of this in a popular EV site called Electrek, both interesting reads.
In a nutshell though, this Jason was already somebody who likes to tinker with cars and tinker with Teslas.
And he made a few bobs here and there with some simple bug bounties that Tesla was offering.
So for example, many electric chargers are online so that drivers can see either in their car or using an app which chargers are available, which ones are offline.
I speak from experience, very handy when running low on juice or electrons, I guess, because unlike filling up a combustion engine car, charging an EV isn't a 5-minute job, takes some planning.
Now, Tesla EV charging points are online, but information about them is a little bit sketchy, or at least it was at the time.
So what this Jason fella does, he had to poke around to see if he could make charger information easier to access. And guess what?
He found some holes in the public-facing Tesla Supercharger Central server and was able to scrape data for every charger in the world every few minutes. So what do you do?
You post your findings on your nearest Tesla forum. And as proof that staff do lurk in these places, yeah, somebody from Tesla got in touch.
In fact, within 20 minutes of posting, he was on a conference call with the head of software security at Tesla.
It did give him some insight into how Tesla's online services work, and having, you know, received a nice bit of pocket money, he decided to delve in a little bit further.
So he found some further Tesla servers lurking on the internet, and he discovered that they really weren't the most secure.
And he stumbled across—imagine you're just having a bit of a snoop around—he stumbled across an image of a server called Mothership.
Now, if you're poking around on a network and find a server called Mothership, chances are you've kind of struck gold as a hacker.
So long story short, the vulnerability report goes into this in some really good detail. He was able to pretend to see any car in Tesla's fleet.
He could see information about any car, its location, its temperature, its range, whether it was locked or not. And he was able to send commands to it.
All he needed was the VIN, the vehicle identification number, a bit like a MAC address on a computer, I guess.
But he had access to all of those too, because also on the mothership was what Tesla called its Tesla Dex, its Rolodex. So entire fleet, entire inventory of vehicles was there.
So I mentioned he was able control the cars. So specifically, one of the functions he was able to trigger was the Summon feature.
Now this lets drivers remotely move their cars forwards or backwards a few meters so they can get into or out of tight parking spaces. Very handy.
Probably not that helpful for my drive though. Now, our tinkerer, again, he's good. He's a tinkerer. He's not a bad guy. He's a good guy.
He compiled all of this information, and because he's got the bat phone now to Tesla's security team, he drops them a line.
And the story in Electric, it describes how our man Jason, he asked Tesla's head of security there and then, who's in California, to give him the VIN of any nearby Tesla.
So he just went out to the parking lot, picked a Tesla, got the VIN for it, and Jason immediately, from where he was somewhere in North Carolina, he was able to issue the summon command and move it forward by a few feet.
And I understand that the Tesla team pulled a few late nights to fix the chain of bugs in their servers. And they've certainly upped their bug bounties since then.
But Tesla does appear to have improved its cybersecurity stance since then and actively engages with white hat hackers like this Jason fella. It's big at conferences.
It does bring its cars along to hacking competitions and encourages people to go ahead and hack them. And it offers some really substantial bug bounties as well.
I think I saw something like £900,000 for someone who could hack a Tesla Model 3. So all in all, I think this is actually a really good story because nothing is ever—
So I think that's a good story. Certainly a cautionary tale about what can happen when you're lashing your cars together at such rate.
Remember, Tesla only put its first tires on tarmac back in 2014, 2015. So by 2016 or '17, I'm sure there's a lot of code that's relatively immature still kicking around.
Fingers crossed for any Tesla owners out there, which I'm not one, that they do keep on top of this security.
The idea was to replace all the power-hungry streetlights with more efficient LED streetlights.
Well, you know, you may not like the light, but they use 60% less energy.
And the council won't— they've orientated it in such a way that it lights up our entire house and our bedrooms rather than the road.
And we are constantly in communication with them saying, "No, don't do that."
According to GE, GE were the original San Diego partner in this project. The city ended up replacing more than 35,000 lights, yielding an estimated $2.2 million savings per year.
So big bucks for a poor city.
Hence, there's this argument for smart streetlight systems, right? This way, the city could monitor the LEDs and then replace them before they got dangerously dim. Makes sense.
But you know, you guys know function creep. Function creep is exciting. And San Diego smart streetlights ended up not just reporting a request for a bulb replacement.
And while they look like any of your typical streetlights from down far away, they sport a number of tiny data-hoovering sensors called nodes.
So let me just share with you all the stuff that is found in some of these super smart light bulbs.
What kind of stuff do you imagine people doing just from this information?
So inside these streetlights, you will reportedly find an Intel Atom processor, half a terabyte of storage, Bluetooth and Wi-Fi radios, two 1080p video cameras, two acoustical sensors, and environmental sensors that monitor temperature, pressure, humidity, vibration, magnetic fields, and much of the data is processed on the node.
So this is what they call edge processing.
I think the primary way I would use something like this is, of course, to stop dog fouling when people are taking their dogs for a walk. And they go—
You see all these little— these antennae sticking out everywhere.
And this was to process all the metadata collected by the sensors.
And according to GE, these smart streetlights were there to help San Diego become the largest municipal Internet of Things network in the US.
I mean, literally, you can get real-time data on anything, vehicles, pedestrians, bicycle traffic, everything.
You know what I would like this to somehow tie in with a UPS or DHL delivery service, because at the moment, what happens is, when you get one of those emails saying, oh, we're going to deliver, you know, sometime by the end of the day, and you're not really sure, you know, can I pop out or not?
Can I pop out? I actually now have to make a great big palaver about leaving the house and pretending to leave the house. Like, oh, I'm just putting my coat on. I'm going to go out.
Together in order to hide behind the dustbins, because I know as soon as I leave the house they're going to deliver the item.
So I'll basically be in a, you know, I'll be hidden away in the garden ready to pounce.
But if something like this was operating, I could find out in advance they're in my street, they're coming close, do not leave the premises, right?
Because this sort of thing would be able to look at vehicles, it'd be able to look up license plates, and, you know, with it—
They anonymized all the information and then hoped that app developers would kind of say, "Hey, this is cool, we can jump on board with this and develop a cool app." And, you know, and contribute to the bright connected future that San Diego aspired to.
Unfortunately, it turns out that very few independent app developers took them up on this offer. So there's that.
Back in 2017, the San Diego Deputy CEO said, "I see streetlights as the platform to transform our communities.
They help connect us to our citizens, provide a future where we are better able to understand our neighborhoods and give them services they want." And this is how they basically marketed it across the city.
So we're now 3 years on from this 2017, you know, yeah, how's it all going? Yeah, it must be great. Must be utopia.
So, okay, this is a little complicated, so if it's too much, just stop me and I'll clarify, but it is worth listening to. Okay?
So GE Current is who supplied the smart streetlights and used and managed it under this thing called CityIQ. Okay, so you have GE Current, they're the partner of the city.
And as part of the deal with GE Current, they ran the cloud-based analytics of all the sensor data on the platform, the CityIQ platform.
But get this, the cloud operator rather than the city owned any algorithms derived from the data.
Twist number 2, American Industrial Partners sells off the CityIQ platform in May to Ubiquiti, a Florida manufacturer of streetlight sensors and software.
The American Industrial Partners kept the LED lighting side of the operation. So they kind of divided up the kind of surveillance and the lighting.
So if we fast forward a year on to 2018, right, from when it was first introduced in San Diego.
Realize somewhere who has access to that data.
So a year after the installation, in August, a cop investigating a murder in San Diego's Gaslamp Quarter looks up and sees the smart streetlight, and he realizes the streetlight's video cameras have a perfect view of the crime scene, one unavailable from the variety of security cameras that were around the area, right?
And GE Current were able to pull it up from its cloud servers and then forward it over to the police department.
And it was clear from that point that some of the video could help solve crimes. And the city felt it had an obligation to turn over that information when there was a major crime.
So this is the view from the city of San Diego at the time.
The next, the following year, 2019, the police department adopt a formal policy around the use of streetlight data and stated that video and audio may be accessed exclusively for law enforcement purposes.
With the police department as the custodian of the records.
The city sustainability department, this is the home of the whole streetlight program, did not have access to the crime-related data.
Thank you very much, City of San Diego, for putting this up.
So this was just announced. No one really knew this was happening, right? So this all came out earlier this year, and people were like, what?
And in the list, it included murderers, sexual assault, kidnapping, things, but it also included vandalism and illegal dumping. I feel weird saying that word in English.
How do I say—
Which caused— in the dumping bit, in the vandalism bit— caused activists to go, is that actually what you would call a serious crime? Now you have two sides.
One side saying control and surveillance creep is bound to happen, so they have unfettered access, and why would they call illegal dumping a serious crime?
I heard today about a guy who regularly has to force his electric vehicle to go up on the curb in order to get onto his drive properly in possibly a dangerous way.
Is that the kind of thing which a streetlight could spot?
So if there were a contract or if there were something in place at the beginning that would maintain the sanctity of that data for its original purpose in some way, notwithstanding mergers and acquisitions and sales, then I think that would protect everyone's interests and the original intent of that installation a lot better.
But I mean, who knows who this stuff could have been sold to? It's ended up with law enforcement.
There are some other pretty rotten places that that data could have ended up, could still end up as well.
The dumping incident involved a truckload of concrete that blocked vehicles from entering and exiting a parking garage used by the FBI employees, and therefore, in their view, qualified as a serious situation.
But this also fits in with their whole contract fiasco that's going on under the waters.
They're now dealing with a company called Ubiquia, and they now own and manage the technology and manage the algorithms and the data. So they need to hammer out a new contract.
It's sorry, I know I agreed to do this, but oh yeah, no, we had to sell, so you're now dealing with Joe Blow here. You didn't have a— you didn't know?
He didn't— I just think it's crazy.
For admins, you get a centralized dashboard to administer all the integrations and the policies in the reporting. Plus, you get a vault for every single user.
And users, you have these cool functions autosave and autofill, or organizing notes and documents, or helping you manage your work and personal life separately.
Check it out at smashingsecurity.com/lastpass. And remember, home users, you can use it at home for free. More info at smashingsecurity.com/lastpass. LastPass.
Your staff must be ready too. Immersive Labs delivers hands-on, challenge-based training and exercises to make your team ready to fight real-world threats.
Check out their free ebook all about the MITRE ATT&CK framework and how you can use it as a part of your cyber skills strategy.
Phishing, and improve your security posture by identifying weaknesses. Go to immersive-labs.com/smashing right now to download your free ebook. That's immersive-labs.com/smashing.
And welcome back, and you join us on our favorite part of the show, the part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
I don't know quite when it happened, but I remember seeing Paris Hilton doing her airhead bit on some TV show once.
Anyway, but yes, Paris Hilton had a reality TV show in, I guess, the '90s or something like that. There is now a documentary on YouTube called This Is Paris, all about Paris Hilton.
Which she sponsors.
And of course, she's actually an incredibly successful entrepreneur who's dashing around and has her finger in many pies and is making herself quite a mint from perpetuating this image.
I'm about halfway through because it only just came out yesterday at the time of recording.
I think it's trying to set itself up as another, one of these subscription services. Because I think you can pay YouTube, can't you, for content.
But given that every tech firm out there is trying to turn into a media outlet and a content creator, from obviously Apple and Netflix and so on, yeah, Google's trying to get in on the act, or Alphabet's trying to get on the act with YouTube as well.
And I watched the first 5 or 10 minutes of this when you shared the link earlier on, Graham. And yeah, I was pleasantly surprised.
And that first point that you make about, you know, what is her voice?
I think they very cleverly play on that in the intro sequence to it where she goes into a recording studio and goes, hi everybody!
And she starts speaking in half a dozen different voices saying, what is my voice? What is my voice? What is my voice?
You know, I thought it was very knowing and very self-referential, but it was quite intriguing nonetheless.
So I suspect I will watch a bit more of it, but I know my wife will watch all of it.
Everyone's had some kind of trauma, I think. But she does seem to have had some particularly traumatic events happen to her, which are touched upon in the—
So you may have noticed over the last few years that escape rooms have been very popular, as have quizzes that mix real-world exploration with fantasy. So not just Pokémon Go.
I've done some of these in the past where you and a team of buddies become detectives and you have to solve a crime against the clock by following clues planted in real places across the city centre.
We did one on the South Bank of London fairly recently. Good fun. Yeah, really good fun until COVID hit and kind of put the kibosh on all of that.
But one of the firms behind these experiences Hidden City has just released an immersive game, they call it, that still creates this buzz of physical exploration and collaborative gaming with your buddies, but it works absolutely perfectly in lockdown.
So it's called Moriarty's Game: A Killer in the Hive, and you are a detective in a security operation, and you are guiding a frontline on-the-ground investigator as she tracks down a crime network following leads that you're giving her.
It's ingenious, and it really feels genuinely immersive because you're using CCTV, you're making calls to contacts on your mobile, you're leaving voicemails to people, and there's some really clever speech recognition stuff that makes that bit work.
You're even hacking into home security systems using images on people's Twitter accounts and so on.
It creates a real drama, a real sense of achievement, and you do feel as though with a bit of willing suspension of disbelief, you're doing this for real.
We did it a couple of weeks ago with some friends, and it works very well if you and your team are in the same room.
But the genius is it also works if lockdown means you're in different places, because you will get the same messages on your mobile.
You all are told to go to the same CCTV addresses on the internet.
So real hats off to Hidden City for this, because it surprised genuinely surprised me no end that something like this could work so well, be so immersive, and so much fun.
And that is why Moriarty's Game: A Killer in the Hive is my pick of the week.
From what I recall, it all seems there's no profanity in there.
But certainly, you know, there was me and a bunch of similarly aged chaps and chabettes, and we had great fun, great time.
And I use Reddit, and I look around, and I find lists from people. But it can be hard, right? Because I tend to shy away from social media pool parties, right?
So I don't get that drip, drip, drip of new news. Anyway, so I found this just by chance. I happened to be just zooming around, looking around for a new podcast to just check out.
And I found this one called Castology.
And this is where 3 hosts, Liz, Nick, and Zane, and I think they're all based in Australia, they discuss podcasts and give us their takes on it. So the format's really cool.
They each find a podcast to recommend to the others. They may think the others might like it or not like it, but they think it's worthy of a listen.
And then everyone listens, and then the following week everyone kind of reports back.
So every week you have a new recommendation from one of them, and then you have 3 kind of reviews from everybody and what they thought about it.
I've gone through their list and I've listened to probably 50, 60% of what they talk about.
So that's really exciting because I can kind of get a little taste of a new pod without diving in.
What I like about them is they don't just sit there and wax lyrical about every single podcast, because that would be boring, right?
Sometimes one of them likes it and the other just— the other two just do not dig it at all, or two of them like it and the other one doesn't, right?
So it's— I think that's kind of interesting and it's a bit edgy. So we'll see if they cover— we'll see who they like better.
And don't forget, if you want to be sure never to miss another episode, subscribe in your favorite podcast app, such as Overcast, Apple Podcasts, Spotify, Pocket Casts, and you'll never miss another.
Also, high five to this week's Smashing Security sponsors, Immersive Labs and LastPass. Their support helps us give you this show for free.
Check out smashingsecurity.com for past episodes, sponsorship details, and information on how to get in touch with us.
And then as a cow goes and it goes into one of your own quadrants, you get a point. Summer fun.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
David McClelland – @DavidMcClelland
Show notes:
- Kalashnikov smart shotgun – MP-155 Ultima.
- Kalashnikov reveals first Russian-made smart shotgun MP-155 Ultima — YouTube.
- Mike Jernigan, blind veteran, uses a TrackingPoint system to land a 300+ yard shot — YouTube.
- See how a self-aiming sniper rifle can be remotely hacked — Hot for Security.
- Tesla Network Vulnerability Report – 2017-03-24 (Annotated) — Google Docs.
- The Big Tesla Hack: A hacker gained control over the entire fleet, but fortunately he's a good guy — Electrek.
- Smart Streetlights Program — City of San Diego.
- Cops Tap Smart Streetlights Sparking Controversy and Legislation — IEEE Spectrum.
- Mayor orders San Diego's Smart Streetlights turned off until surveillance ordinance in place — The San Diego Union-Tribune.
- Mayor was right to shut off Smart Streetlights — The San Diego Union-Tribune.
- Hints of life on Venus — University of Manchester.
- "This Is Paris – The Real Story of Paris Hilton" — YouTube.
- “This is Paris” is a quixotic redemption story about what it means to be a human and a brand at once — Salon.com.
- Moriarty's Game: A Killer in the Hive.
- Castolog – a podcast recommendation podcast — That’s Not Canon Productions.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
LastPass Enterprise makes password security effortless for your organization.
LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure your business with centralized control of employee passwords and apps.
But, LastPass isn’t just for enterprises, it’s an equally great solution for business teams, families and single users.
Go to lastpass.com/smashing to see why LastPass is the trusted enterprise password manager of over 33 thousand businesses.
Immersive Labs delivers hands-on, challenge-based training and exercises to make your team ready to fight real-world threats.
Check out their free ebook all about the MITRE ATT&CK framework, and how you can use it as part of your cyber skills strategy and improve your security posture by identifying weaknesses. Visit immersivelabs.com/smashing now.
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.

