Ooh la la! Horreur Wi-Fi en France! Some folks have experienced the drawbacks of Web 3.0 as their NFTs are stolen, and should computers own the copyright over the art they produce?
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley.
Plus don’t miss our featured interview with Sean Herbert of baramundi.
Smashing Security #263: Problèmes de Weefeee, AI artists, and Web 3.0'
Listen on Apple Podcasts | Spotify | Google Podcasts | Pocket Casts | Other... | RSS
Graham Cluley – @gcluley
Carole Theriault – @caroletheriault
Mark Stockley – @markstockley
- Les dents, le brouilleur et au lit! — ANFR.
- Dad takes down town's internet by mistake to get his kids offline — Bleeping Computer.
- My first impressions of web3 — Moxie Marlinspike.
- Graham or Carole? – NFT for sale — OpenSea.
- $1.7 million in NFTs stolen in apparent phishing attack on OpenSea users — The Verge.
- Art Copyright, Explained — Artsy.
- The US Copyright Office says an AI can’t copyright its art — The Verge.
- Ruling on "A Recent Entrance to Paradise" — Copyright Review Board.
- Appeals court blasts PETA for using selfie monkey as ‘an unwitting pawn’ — The Verge.
- 'Monkey selfie' case: Photographer wins two year legal fight against Peta over the image copyright — The Independent.
- What I Wish They Taught Me about Copyright in Art School — Library of Congress.
- Who is Banksy and why did he lose the trademark for four of his most famous works? — Sydney Morning Herald.
- The Tinder Swindler — Netflix.
- You Can’t Make This Up: The Making of a Swindler (Part one) — Podcast going behind the scenes of “The Tinder Swindler.”
- Why insects do not (and cannot) attack healthy plants — YouTube.
- Eye of the Storm — BBC iPlayer.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff
- Support us on Patreon!
Optimize your IT processes with the baramundi Management Suite and make optimal use of resources by automating time-consuming routine tasks.
Stay in control and maximize your productivity by automating routine tasks. The Unified Endpoint Management Software can be installed and implemented quickly, is intuitive to use, has a modular structure and offers a high level of usability and transparency.
Try out the free 30-Day full version for yourself today at baramundi.com/smashingsecurity
At Kolide, we believe the supposedly Average Person is the key to unlocking a new class of security detection, compliance, and threat remediation. So do the hundreds of organizations that send important security notifications to employees from Kolide’s Slack app.
Collectively, we know that organizations can dramatically lower the actual risks they will likely face with a structured, message-based approach. More importantly, they’ll be able to engage end-users to fix nuanced problems that can’t be automated.
Try Kolide Free for 14 Days; no credit card required.
Follow the show:
Follow the show on Twitter at @SmashinSecurity, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.
Found this article interesting? Follow Graham Cluley on Twitter or Mastodon to read more of the exclusive content we post.