Smashing Security podcast #240: 3D printer hijacks, crypto fails, and a tech billionaire’s revenge

Industry veterans, chatting about computer security and online privacy.

Graham Cluley
@gcluley

Smashing Security podcast #240: 3D printer hijacks, crypto fails, and a tech billionaire's revenge

A bug unravels 3D printer security, cryptocurrency sites can’t stop getting hacked, and hear our special guest spill a cup of tea while inhabiting his wife’s knicker drawer.

All this and much more can be found in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by BBC cybersecurity correspondent Joe Tidy.

Smashing Security #240: '3D printer hijacks, crypto fails, and a tech billionaire's revenge'

Your browser does not support this audio element. https://aphid.fireside.fm/d/1437767933/dd3252a8-95c3-41f8-a8a0-9d5d2f9e0bc6/4dab0bc2-a8f4-4008-a98a-053956d32882.mp3

Listen on Apple Podcasts | Google Podcasts | Pocket Casts | Spotify | Other... | RSS
More episodes...

Hosts:

Graham Cluley – @gcluley
Carole Theriault – @caroletheriault

Guest:

Joe Tidy – @joetidy

Show notes:

Sponsor: 1Password

Cybercrime is at an all-time high, and it’s not slowing down, so why should you? This August, you’re invited to Security Summer School, a brand new webinar series hosted by the 1Password team.

Learn from security experts at top organizations, hear about sizzling security trends, and get quick tips for building a culture of security at home and work.

Get exclusive perks like 1Password swag for attending events, enjoy the chance to network with top security leaders, and much much more. Find out more and enroll now at www.1passwordsummerschool.com

Sponsor: Attivo Networks

It’s time to get serious about preventing and detecting credential abuse, privilege escalation, and entitlement exposures.

Attivo Networks gives you visibility on identity exposures, vulnerabilities, and attack paths from endpoints to Active Directory to the cloud – all while creating an active defense, delaying and derailing attacks, empowering the defender and eliminating an attacker’s advantage.

Learn more and kick credential attacks to the curb, by visiting www.attivonetworks.com

Follow the show:

Follow the show on Twitter at @SmashinSecurity, on the Smashing Security subreddit, or visit our website for more episodes.

Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!

Warning: This podcast may contain nuts, adult themes, and rude language.

Found this article interesting? Follow Graham Cluley on Twitter to read more of the exclusive content we post.


Graham Cluley is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s when he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows. Now an independent security analyst, he regularly makes media appearances and is an international public speaker on the topic of computer security, hackers, and online privacy. Follow him on Twitter at @gcluley, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.