
Germany tells consumers to stop using Kaspersky anti-virus products, OSINT reveals a secret government department (with help from an Apple AirTag), and the UK says it’s taking a hard line on dick pics.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Chris Kirsch.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name's Graham Cluley.
Now, coming up on today's show, Graham, what do you got?
He said, in view of the current situation, do you think it's wise to continue to use Kaspersky antivirus software? Hmm. I thought that'd be an interesting one to discuss.
John is 83 years old, he tells me. He's retired. He's well into our demographic.
But it is a valid question, one I think many other people might be asking themselves at the moment, because Kaspersky, of course, as we all know here, is one of the most famous names in antivirus.
And it is Russian. And Russia's been in the news lately, hasn't it?
So Kaspersky, multinational company, hundreds of millions of users around the world, headquartered in Moscow, founded and run by Eugene Kaspersky.
He's been writing antivirus programs since 1989.
I probably first met him back in the 1990s. Always seemed like a friendly chap.
You know, he likes nothing more than a drink, trip to the sauna with his mates. And it's who Eugene's mates might be that has often got him into a bit of a pickle.
A few years ago, for instance, Bloomberg and the Wall Street Journal, they claimed that Kaspersky had close ties to Russian spies.
And they even said that Eugene was regularly visiting the sauna with intelligence officers from the FSB.
But some people tried to construe that this was part of some conspiracy, and they said, whoa, isn't it weird that Kaspersky is always reporting on American and Western state-sponsored malware attacks rather than those ones which originate in Russia.
Maybe he's hushing those up.
And I remember at the time I thought, well, actually, if you look back over the Kaspersky blog, there have been plenty of occasions when they have talked about Russian hackers.
And they have talked about Russian campaigns which appear to have originated from there. So it felt a little bit unfair to me.
And so what Kaspersky, the company, used to say was, we don't care where the malware was written, we are going to detect it, we're going to write about it.
And sometimes, you know, feathers were ruffled.
I mean, sometimes I suspect the NSA, for instance, would think, well, fine that you detect our malware, but do you then have to do a press release saying that we did it and pointing the finger at us as well?
I don't know. Anyway.
Kaspersky set up a transparency center in Switzerland and other places around the world trying to quell any concerns that the software could be subject to supply chain exploitation.
They even said, look, you can look at all of our code. If you want to, come to Switzerland. They took their biggest customers there.
And there's no doubt it affected their sales in the West, at least, although they were doing still quite well in the East.
That did not impress the current administration, who then contacted the Trump administration and said, put the kibosh on the Kaspersky stuff, just to hurt them financially.
There you go.
Forbes estimate he's worth about $1.8 billion.
It all comes down to Russia's invasion of Ukraine. So obviously, when something like that happens, people are going to look to high-profile Russians working in tech.
I mean, Eugene, in a way, he's a bit like Richard Branson or Lord Sugar or—
And he put out a tweet where he said he welcomed the start of negotiations to resolve the, quote, current situation in Ukraine and hoped it would lead to a cessation.
How do I say cessation?
Undermining Kaspersky is a big asset for the Russian state. So there is a motive there, and it's really hard to prove a negative.
So I used to sell crypto software in Germany to German companies, right? And all we needed to say is, hey, do you really trust the Americans? We didn't need to prove anything, right?
And we didn't have to be specific. And it's just so hard for them to disprove that. Then we got acquired by an American cryptocurrency company.
But you know, if I had to choose between different antivirus companies, you know, quite honestly, for a corporation especially, and for anything to do with government, I probably wouldn't pick Kaspersky now, even though I think they do a very good job.
But it's just impossible for them to prove a negative or for me or anybody who's buying that to prove a negative, and that's really tough.
Obviously, I wouldn't want that to happen to him.
If a piece of software is running at a low level on hundreds of millions of computers around the world, and it's regularly updated by other people in a way which you frankly don't actually choose when it updates or not because it's updating continuously to deal with new malware.
The potential is there for someone either maliciously without the knowledge of Kaspersky the company to do it or to apply pressure and say, this is what you're going to do.
That's the risk, the supply chain.
So I think one of the allegations, and I'm not sure if it was an allegation or if somebody tested it or whatever.
The idea was, hey, if Kaspersky just added a signature for certain keywords, right?
Certain projects, certain people's names, email addresses, any identifier that they're interested in, and just say, hey, every time you see that on a disk, just upload that for analysis.
One of them took his work home with him, put it on his home computer, which was running Kaspersky.
Kaspersky, with its heuristics or whatever, thought, hmm, this looks a little bit malicious. I will upload these files to Kaspersky servers for further analysis.
And then there was this big freakout that Kaspersky was stealing NSA secrets.
Number two, don't put Russian software on your computer. Number three, don't put antivirus on your computer if you're developing malware, right?
It's bad for business and also possibly bad for him.
Six months ago, the founder of another security company, Group-IB, he was arrested in Moscow on treason charges after he criticized the Russian government for not taking action against Russian ransomware gangs.
And after he allegedly provided the US government with information about Russian interference with the presidential election of 2016. So Eugene wants to be careful.
They're telling them to uninstall it and switch to another antivirus because of the risk that pressure could be applied or that it could be hacked.
And this really comes back to John's question. Remember, John sent me an email about whether you should use Kaspersky or not.
I think, who can put their hand on their heart and say that isn't possible in the current political climate, that pressure wouldn't be put on them?
To take advantage of the fact that so many hundreds of millions of computers are running it.
Like you were saying, Chris, earlier on, people are going to question you if you buy Kaspersky, I think, for a corporation, rather like they wouldn't have questioned you for buying IBM in the old days.
It's like, well, that's a decision which no one's going to criticize. People might criticize you for taking a risk on Kaspersky.
And it reminded me a lot of Bellingcat. Bellingcat is a news outlet that is run by ordinary citizens who use what's called OSINT, open source intelligence.
It's a method where you just take what's out in the public, basically fancy Googling, and then put the puzzle pieces together to find out something that's actually highly confidential or secretive.
You won.
And so this story was mostly published in German. All the English coverage was extremely short and it missed a lot of the interesting stuff.
And to me, it really read basically like a German spy novel.
And she's also a specialist for digital transformation in government.
And so she was doing research and looking at all the different government agencies on a website that just really lists, line by line, all the agencies with a very short description.
And she stumbled across an agency that she hadn't heard of before. And it's called Bundesdienst Telekommunikation. So, Graham, we're going to have a lot of long German words in here.
So the Bundesdienst Telekommunikation, it translates as Federal Service of Telecommunications. Couldn't be more bland, right? We're going to abbreviate this as BST.
And actually, back in the day, we sometimes used to joke that there is an agency called the Federal Agency for Telecommunication Statistics.
And so this is actually eerily close to that joke because it turns out that it is actually an intelligence agency that nobody's heard of before.
So Wittmann, she looked at the description of this agency and it said, hey, this agency is tasked with digital transformation and government.
And this was weird because she's a specialist in that area and she's never heard of this agency before. Right? So that kind of raised some questions.
And so she phoned the phone number, which was a fax. Then she phoned the fax number, which was no answer. And so she couldn't get anywhere with that.
And so she started a FOIA request, a Freedom of Information Act request.
The first response she got fairly quickly from somebody with a title Geheimschutzbeauftragte, which basically translates as Secrets Protection Officer.
So it's a role in counterespionage. So that was a little bit weird for a digital transformation agency.
And then she got a second email and said, oh, the first email, ignore that one. We were wrong on that one. We actually, we have no record of this agency existing.
And at the same time, the BST disappeared from the official listing.
And she found in, I think it was some X500 directory or something, and she finds a physical address in another directory for this agency and has a physical address somewhere in Berlin, but it's not an official building that is occupied by any government agency.
So she's got a following and she tweets out and one of her followers says, hey, I checked out the website of the landlord of this building and the tenants list a generic government agency.
So she actually gets in the car, she drives up to Berlin and she goes to the building and it's a very boring average office building, right? Quite big.
But the government agency is occupying, I think it was 2,500 square meters, which is quite a big floor. So that's enough space for about 100 people.
And so she looks at the mailboxes and the BST is on there. And there is a mailbox next to it for Bundesministerium des Innern. So this is the BMI. This is the Interior Ministry.
And the BMI heads up a lot of the civilian intelligence agencies in Germany.
So the BND, Bundesnachrichtendienst, which is the equivalent of the CIA, the BSI, which is the Bundesamt für Sicherheit in der Informationstechnik, please repeat that, which is the equivalent of the NSA, and the BfV, which is, it's Bundesamt für Verfassungsschutz, which is the federal agency for the protection of the constitution.
See, it's even long in English, right?
She goes to a webpage where it lists all the departments which to do with the government, and she finds one and it says, we deal with digital transformation.
She rings them up and they say, oh no, we don't really exist. Don't contact us again.
She then goes to their office, finds a name plaque or something, and alongside it, it says, basically, this is associated with the part of the government which looks after all the intelligence agencies.
So she's not an unknown entity. So then she does some more digging, and she looks up if she can find anything in the RIPE database.
So the RIPE database is where companies register their public IP spaces.
And so she finds a few other IP addresses associated with physical addresses that are associated with the Ministry of the Interior.
And she finds one that's a little bit odd because it's in Cologne. There's no office for the BMI in Cologne. And the email address is a generic email address.
It's not a person, but it's a department and group number. And so you can look that up in the German government, it's very organized, right? As you might expect.
I think there's also a football club, a soccer club involved in Colombia for the Ministry of the Interior, but the Ministry of Interior doesn't have an office in Cologne.
It's only the Verfassungsschutz, which is an intelligence agency.
And so she finds all of these things and she finds a few phone numbers and decides at 3 AM in the morning to phone these cell phones.
And so the person on the other end picks up, is wide awake, and basically it doesn't say it exactly. He doesn't deny that it's the BfV, but he doesn't acknowledge it either.
And the phone number is disconnected the next morning.
If you read Bellingcat or follow any of the OSINT-related stories, it's typically pulling on the string and finding little breadcrumbs and putting them together.
But this next part is what I thought made this story worth sharing.
So she says, okay, so I've got a few PO boxes in Cologne that are associated with the BMI, which doesn't have an office in Cologne.
And there is also one associated with the Verfassungsschutz, the BfV. And they're close to each other in the post office. They're right next to each other.
And she's like, I wonder where the mail goes for these PO boxes. Right?
The AirTags, for those listeners that are not familiar, they look like a pound coin or a quarter, you know, about that size.
And they contain a little battery and a Bluetooth transmitter, low-energy Bluetooth. So they can run for about a year. They don't have GPS.
They don't have a GSM chip or anything to actually communicate out over long distance, but they can communicate over short distances.
What Apple did that I thought was really clever is any iPhone, not just your iPhone, but any iPhone in the world, can now detect these AirTags and deliver the current location of that AirTag to the cloud.
And then it ends up with the owner of the AirTag. So the owner of the device nearby doesn't know that it's happening or can't see what the AirTag is, but the owner can.
Puts in this AirTag and sends it off to the address of the BMI in Cologne, which doesn't officially have offices there.
And sure enough, you know, German postal service is very efficient.
Ten o'clock the next morning, she sees a ping and it shows up at the offices of the Verfassungsschutz, which is the domestic intelligence agency.
And so that proves to her that the BMI is a cover organization for some of its intelligence branches, that the BMI in Cologne is actually Verfassungsschutz, et cetera.
So I thought that was a really clever use of AirTags.
Because they would just go, oh, she's still at her house. It's still at her house.
If I remember correctly, Apple actually created—
It basically tells you if you are close to, if you're moving around and you're close to an AirTag, but the owner of the AirTag is not also with you.
Because if your husband has an AirTag on the key ring, you know, you don't want it alerting.
So I think that's an interesting countermeasure, I guess, against stalking, but it's not foolproof. Yeah.
But otherwise she just consulted open databases on the internet, which is really cool.
You know, if you have an inclination and interest and a passion for OSINT, I encourage you, you know, go digging because you might find something really cool like Lilith Wittmann did.
And I don't know, I probably wouldn't publish it under my own name like she did.
She's got a profile in that space, and I think that somewhat protects her, but I probably wouldn't, you know, poke the bear, so to speak, if we're thinking about the current conflict.
You can pass it on to your local authorities if you like and trust them, and if you know somebody there, you can pass it on to Bellingcat if you find something meaningful, and they can then verify it.
But they have confirmed they're going to include a new cyber flashing law as a specific criminal offense.
So this is where a person sends another person— it's like someone they know or someone they don't know— an unsolicited sexual image, right?
And this could be via social media, it could be by dating apps, it could even be by Bluetooth or AirDrop.
Like some people have a foot fetish. So would you get in trouble if you had particularly sexy feet or you thought you did and you sent someone a picture of your feet?
So even if the transfer is rejected, they're forced at seeing maybe a thumbnail of the image or saying, do you want to accept this image before it fully loads onto your—
If it's something that's larger and potentially malicious, like a, I don't know, spreadsheet or something like that.
So the idea is that this change means that anyone who sends a photo or film of a person's genitals for the purpose of their own sexual gratification or to cause the victim humiliation, alarm, or distress may face up to two years in the clink.
So, I'll paraphrase a few, but things like, "Would authorities need to match the junk with the face that sent it?" for example.
Or, "An attentive—" I'm paraphrasing here, but like, "An attentive member may look very different from a sleeping one." Right?
So, would one need to show it in full glory to the authorities, would the police get their very own cock squad?
And my phone bleeped while I was up there, because I'd obviously been professional, hadn't turned it off.
And someone in the audience had sent me a picture of what I can only describe as a small button mushroom. It was, and it was, I mean, I, that's not really to my taste.
I don't love mushrooms, but I, it's still, did you see that? It was quite off-putting. And I mean, I can only— Did you lose your stride?
No, I mean, you know, we're giggling about it a little bit, but actually it wouldn't be very nice to receive an unsolicited one of those, particularly if you thought it was someone in the vicinity of you, and particularly if you thought it might, you know—
So some of the comments though on Reddit were a little bit more thoughtful because how do you fully define solicited versus unsolicited?
So we risk seeing women's confidence in the criminal justice system reduce even further because they bring it forward and they go, well, look, we don't have enough evidence.
Sorry, it was on Snapchat. Oh God, everything's erased. Don't know. Sorry. Yeah.
You actually need to prove— I think this is in the US— I think you need to prove to the police that it's you.
So you need to either, you know, send the images plus a picture of your driver's license or some proof of identity.
If your head isn't in there, then you need to include a full body shot plus your driver's license and so on.
And it just— yeah, and it just makes it really hard for somebody who's already in a bad place and probably traumatized to get this stuff off the internet, right?
I was listening, this one woman was saying that someone was basically doing this kind of revenge porn, but they'd taken her head and put it on a different body and then shared it around a bunch of forums.
So apparently that's not illegal, right? It's not illegal to do that at the moment because it's not your body, right?
So jokes aside, though, it's a big problem because one place, like you mentioned earlier, Graham, is public transport. So this is from Stylist magazine.
So this was someone writing a kind of, you know, this happened to me type of story. So she says, I was on the train to London for work.
I had a series of 5 images sent to me via AirDrop. Weirdly, they were telling a story. The first was a picture of someone getting on the train, a CGI mockup.
It was followed by a topless photo of a guy with his face covered, then by a picture of his crotch. I received messages saying, want more? But I had declined all of them.
And in the meantime, I got another picture, a full-on nude of his privates. And the thing was, there's only a few people in the carriage at this point.
It was really intimidating as I was the only female, and my phone would have showed up with my name. It isn't nice. Nima Elmi, she's head of public policy for Europe at Bumble.
So they did some big research into this.
And they said the research showed that almost half of women between the ages of 18 and 24 have received sexual photo that they did not ask for in the last year. Oh, crap.
In the last year? Yes. Public transport's a place it's happening, but also it happens in schools, okay?
Someone reported just after a math lesson, this woman's 14-year-old daughter received not one but five unsolicited pictures from different classmates' penises.
Okay, and they ganged— because they ganged up and thought it would be funny to send them all at once, said the mom.
And they watched her reaction as she opened them, and she got really upset, which they found hilarious. What?
So TESS, okay, so they work with 25,000 schools across 100 countries, right?
So they've done a bunch of research into this, and they said that 76% of girls between the ages of 12 and 18 have been sent unsolicited nude image of boys or men, which is, that's 3/4 of teens.
And the thing is, basically apparently what they say in tests is basically if you use Snapchat, you will be sent a dick pic.
And the biggest problem, the reason why this law is, in my view, a good idea is because the problem is school politics, right? Girls who get these are encouraged to laugh it off.
Yeah. Or called a snitch if they report the sender. And there's, of course, the shame factor that you're being targeted.
Claire McGlynn, she's a QC of Durham University, and she specializes in cyber flashing.
And she says this law is interesting, but the government must go further if it's going to live up to the rhetoric.
The current proposal only covers cyber flashing where you can prove that the person that sent the image for sexual gratification or to cause distress.
This leaves a significant gap where men send the penis image for a laugh or a joke among their friends, in this case in the school, you can imagine that would be the retort.
We were just having a laugh. It wasn't to make her feel, you know, harassed. Yeah, it's so rampant.
You can turn off AirDrop, or you can reduce, you know, limit AirDrop to only known contacts, which would have helped for the public transportation, but not in school with her friends, right?
Now, if you're anything like me, I've got hundreds of contacts, hundreds and hundreds of contacts in my phone.
And not all of them do I want them to be able to AirDrop me willy-nilly. You know, some people are just work contacts, like podcast contacts.
When a photo's sent, and what we did was rather than, you know, very funny or something, or delete it or something, maybe there should be a way of actually blowing it up, you know, to a huge size and putting it on the side of the school or on a side, or, you know, putting it up in assembly on the big screen and say, oh, here.
Oh, shame them. Shame them. Absolutely. And saying, here's little Tommy Coggins or whatever from year 5, and this is his penis, everybody, which he wanted you all to see.
Let's all discuss it.
Okay, I'll share a few with them, with you. One of them was critique them on a scale of 1 to 10, which is basically what you're saying to do, right?
The other one is, why is your pinky so ugly? That's what she would reply.
If I found out any son of mine were doing something like this, you just take their bloody phone away and say, don't be so bloody, you know, apologize to the girl and you're not having your phone until you're 18 years old.
And yeah, but yeah. Oh, I'm quite tough, aren't I?
Kolide is perfect for organizations that care deeply about compliance and security, but don't want to get there by locking down devices to the point where they become unusable.
So instead of frustrating your employees, Kolide educates them about security and device management while directing them to fix important problems.
Sign up today by visiting smashingsecurity.com/kolide. That's smashingsecurity.com/kolide.
Enter your email when prompted and you will receive a free Kolide goodie bag after your trial activates.
You can try Kolide with all of its features on an unlimited number of devices for free for 14 days. No credit card required. Try it out at smashingsecurity.com/kolide.
That's smashingsecurity.com/kolide. Smashingsecurity.com/kolide. And thanks to Kolide for supporting the show.
At G2's highest-rated cloud compliance software, Drata streamlines your SOC 2, your ISO 27001, your PCI DSS, your GDPR, and your HIPAA compliance.
Plus, it provides 24-hour continuous control monitoring so you can focus on scaling securely. Drata is the only compliance automation platform with a private tenant database.
They say it's like having your cake and securing it too.
Countless security professionals from companies including Notion, FullStory, and BambooHR have shared how crucial it is to have Drata as a trusted partner in their compliance process.
Listeners, you can get 10% off Drata and waived implementation fees by visiting smashingsecurity.com/drata. That's D-R-A-T-A. And thanks to Drata for sponsoring the show.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
The likes of Serial and all of the others. I mean, oh, you're just, you're listening to them and you're thinking, oh, this is fantastic. Isn't it? This is extraordinary.
Well, I have got an investigative mystery podcast for you headed by a journalist called Brian Thompson.
And the name of his podcast, which has been running for the last 5 years, over 240 episodes, is Whatever Happened to Pizza at McDonald's?
He started off quite simply ringing up his local McDonald's and asking them if they had pizza and them saying no and him saying, well, do you know why you don't have pizza any longer?
Because I believe you used to have pizza because apparently McDonald's used to do pizza in order to try and win the pizza business from all those pizza companies.
And he's trying to get to the bottom of it. Over time, the podcast has broadened out a little.
One of the latest episodes of the podcast, he looks into, as well as the pizza issue, which is central to the podcast, he also looks into Rod Stewart's model train set.
How the hell is that related?
He's got a voice a little bit like the robot voice who introduces our podcast each week. So he says, "And so I called McDonald's to find out what they've got." I love that.
And I think it's amusing and it's done very well. And it is my pick of the week.
This is a different one because it's not one that you play by yourself, but then you play with others.
And I was looking for something, you know, my niece and nephew live over in Europe and I'm in the States. And so we don't get a lot of real FaceTime.
And, you know, even when we're having video chats or something, it's hard to keep a conversation going with little kids.
But if you can play together, then you can actually have a joint experience. And so I found this game called Cookout: A Sandwich Tale. And so you need at least two VR headsets.
I think it's available on other platforms as well. I have the Oculus. And essentially you are making sandwiches in a shop as line cooks and you're collaborating, right?
It's not working against each other. It's actually working with each other. And that I think makes it more fun.
And so you take orders from customers that are mice or rabbits or werewolves who like the bigger sandwiches. And it's really good fun because you can talk over the VR headset.
Obviously, you don't see the real person, you see an avatar. And you can talk and communicate.
The kids started squirting ketchup and mustard bottles all over the place and throwing plates at the werewolf, which I both do not recommend in real life.
So that's kind of like the entry level. I think they have some with more storage and so on that go higher up.
And it reminds me a little bit of Overcooked, which is like a more conventional video game where you're sort of helping each other cooking and chopping and things.
It does look like this would be a good way to keep in touch with youngsters and play a fun game with them. I can see why you would do this.
You can learn should we work on sandwiches together or split plates and— Yeah, so there's strategy involved. Yeah. You can teach them how to work in a corporate sweatshop.
You know, it's a good skill to have for later. And you don't have to clean up your kitchen afterwards. So it's really a good package. And I think it's about $20 or so.
So the game itself isn't too expensive if you've already invested in the headset. Obviously, the headset's quite expensive.
Now this is an amazing site all about the stars, not celebs, right? But the real stars in the sky.
So when you click on a specific star, it provides you with tidbits and information.
So Graham, if you're there, you can see they give you a high-level tour and tell you how to use it. Oh yeah, I found it quite relaxing.
I imagine at night playing on this site would be quite beautiful if you couldn't sleep, right? Because it's quite beautiful the way you move around it, and it doesn't—
But yeah, totally, if you've got the real thing. So I don't know, I think it was quite beautiful. I think it's quite fun.
If you want to learn a bit about the stars that burn hot way, way up in the sky, this might be for you, and might be a great way to spend your tea break.
So check it out at stars.chromeexperiments.com, and of course, link will be in the show notes.
Chris, I'm sure lots of our listeners would love to follow you online. What's the best way for folks to do that?
And if you'd like to try out Rumble, you can do that at rumble.run as in run and scan your networks in minutes. So check that out. Thank you.
And don't forget to ensure you never miss another episode, follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Google Podcasts.
For episode show notes, sponsorship information, guest lists, and the entire back catalog of more than 265 episodes, check out smashingsecurity.com.
That's all I know.
See, today I learned.
Basically, loosely translated, because it's a really weird song and the lyrics aren't very complicated, it means like, oh, one more, you can fit one more in, meaning one more beer, right?
Hopefully we're not thinking of the segment that Carole presented earlier, right?
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Chris Kirsch – @chris_kirsch
Show notes:
- Kaspersky Has Close Ties to Russian Spies — Bloomberg.
- Kaspersky hit by new below-the-belt sauna spy attack — Graham Cluley.
- A practical guide to making up a sensation — Eugene Kaspersky.
- US intelligence chiefs don’t trust Kaspersky. But why? — Graham Cluley.
- UK cyber agency targets Kaspersky in warning on Russian software — Reuters.
- Group-IB founder arrested in Moscow on state treason charges — The Record.
- BSI warning about using Kaspersky.
- Kaspersky statement regarding the BSI warning — Kaspersky.
- Collateral Damage — on Cybersecurity — Open letter from Eugene Kaspersky.
- Apple's AirTag uncovers a secret German intelligence agency — Apple Insider.
- Bundesservice Telekommunikation — wie ich versehentlich eine Tarnbehörde in der Bundesverwaltung fand — Lilith Wittmann.
- Bundesservice Telekommunikation — enttarnt: Dieser Geheimdienst steckt dahinter — Lilith Wittmann.
- Loophole in law means men will still get away with sending penis pictures — Cambridgeshire Live.
- Cyberflashing to be criminalised under new online safety bill — The Independent.
- ‘Cyberflashing’ to become a criminal offence — UK Government.
- Is there hidden sexual abuse going on in your school? — TES Magazine.
- 13 genius ways to respond to unsolicited dick pics — Cosmopolitan.
- Whatever Happened to Pizza at McDonald's?
- A Podcast Answers a Fast-Food Question That Nobody Is Asking — The New York Times.
- Forget Adnan and Richard Simmons, ‘Whatever Happened to Pizza at McDonald’s?’ Is the Mystery-Solving Podcast You Need — Vulture.
- Cook-Out on Oculus Quest — Oculus.
- Cook-Out: A Sandwich Tale trailer — YouTube.
- 100,000 Stars.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
At Kolide, we believe the supposedly Average Person is the key to unlocking a new class of security detection, compliance, and threat remediation. So do the hundreds of organizations that send important security notifications to employees from Kolide’s Slack app.
Collectively, we know that organizations can dramatically lower the actual risks they will likely face with a structured, message-based approach. More importantly, they’ll be able to engage end-users to fix nuanced problems that can’t be automated.
Try Kolide Free for 14 Days; no credit card required.
Is your organization finding it difficult to achieve compliance and scale its security posture? As G2’s highest rated cloud compliance software, Drata streamlines your SOC 2, ISO 27001, PCI DSS, GDPR & HIPAA compliance and provides 24-hour continuous control monitoring so you focus on scaling securely. Drata is also the only compliance automation platform with a private tenant database. That’s like having your cake and securing it too
Countless security professionals from companies including Notion, FullStory, & BambooHR have shared how crucial it has been to have Drata as a trusted partner in the compliance process.
Listeners of Smashing Security can get 10% off Drata and waived implementation fees at smashingsecurity.com/drata
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.
