
Mix TikTok with facial recognition, and you’ve got a doxxing nightmare, T-Mobile users report bizarre behaviour in their accounts, and a Windows flaw provides a new means of infecting users.
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Paul Ducklin.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
And I'm just going, I would never have known if you hadn't told me. You made me create an account. It took quite a while. I got to think up a password and give you my phone number.
Not anymore. They don't do phone numbers, but, you know, for two-factor authentication.
I would never have occurred to me that because I had to log in in the first place to use the account, that I might ever want to log in again.
Smashing Security, Episode 341: Another T-Mobile Breach, Theme Bleed, and Farewell Naked Security, with Carole Theriault and Graham Cluley.
Hello, hello, and welcome to Smashing Security, Episode 341. My name's Graham Cluley.
And I'm— I hope I don't tear up now. I think I'll be all right. And I'm leaving the company at the end of this very week.
It's their support that helps us give you this show for free. Now, coming up in today's show, Graham, what do you got?
Last week, users of the T-Mobile mobile app— that's not me stuttering there— the T-Mobile mobile app for T-Mobile, they started complaining online about something they're experiencing.
So they're going into their mobile phone app to check their account details.
And when they did that, they found they weren't actually accessing their own bills and their own account information. They could see other people's details instead.
So you could see other people's names, their home addresses, their credit balance, their contact numbers, their device IDs, their credit card information.
But certainly, it wouldn't make you feel very comfortable about how well T-Mobile was looking after your own data, of course, because if they're showing you other people's, the next logical thing you should be thinking is, could it be that my data is also being shown to other people?
They were saying, well, yeah, they didn't have all of the sensitive information there, but enough to show that it wasn't them.
Or Android users were showing information suggesting that they had iPhones connected to their account.
Could you send us a DM? We want to ensure your privacy and we'll look at your account and address all of your concerns, they were saying.
But yeah, so some users, some T-Mobile users, they believed when they saw this other information, they thought, whoa, whoa, whoa. Am I a victim of some kind of hack?
Has someone broken into my account, put their details in? Is someone else offering to pay my mobile phone bill each month? Exactly. This must be some kind of scam. Yeah.
T-Mobile support though, they responded and they said to the media that it was actually, it was all the fault. There wasn't a data breach, they said. It wasn't a data breach.
This was the fault apparently of what they called a technology update, not necessarily a technology update which you actually want.
So they said there's no cyberattack or breach at T-Mobile.
If I log into my account, I should see information that I expect to see and I shouldn't be allowed to see, or it shouldn't be possible for me to see other personally identifiable information for other people.
I suppose to try and see it from T-Mobile's side, maybe they're thinking when we say breach, it means that someone steamed in and uploaded gigabytes or petabytes of stuff.
So I think—
If you know the crooks have been in and they've got absolutely everything, then you can basically fall on your sword and say, look, as far as we can tell, they stole 62 gigabytes and it affected 14.5% of our user base, and we will contact each and every one of those people to tell them what to do next.
But when you know that X could have seen Y's data, and quite a lot of Xs saw quite a lot of Ys, how do you know just how much leakage there was?
And how do you decide how controllable it was by the person who's viewing it? So, you know, Graham, you log in, you see Carole's data, and you think, wow, that's bad.
But if you're more of a sort of Axel type who thinks, wow, something's gone wrong, let me see if I keep logging in, will I get more and more and more? Can I automate this?
Can I scrape data?
They said it was a temporary system glitch related to a planned overnight technology update involving limited account information. And they said for fewer than 100 customers.
And they said we quickly resolved it.
Now, from what I've seen online, it's not fewer than 100 customers who saw other people's information.
It was, according to T-Mobile, fewer than 100 customers who had their information exposed to God knows how many people.
So I don't know if they would have cycled through 100.
But, you know, again, I think it feels to me T-Mobile are trying to downplay this a little bit, saying, well, not, you know, okay, not a cyberattack. I get that.
It does feel to me it is a breach to my mind.
And people's addresses and their names and, you know, whether they've got an Android or an iPhone, which is, as Duck has explained, is a dangerous thing to know about somebody.
One person on Reddit, they said it wasn't a breach, it was a data exposure due to sheer incompetence. And I think in some ways, this is actually worse than a breach.
Okay, maybe less people have been affected. No, it's not.
As far as a customer perspective, it still sucks that somebody saw my data and that I don't know who and I don't know how many.
At least it doesn't sound what do they call it, an IDOR, or was it insecure direct object reference where there's /55 in the URL and when you put 56, you get the next customer and 57 and 58, 'cause then I bet you somebody would've scraped as much as they could.
But it does sound as though some kind of database index in the backend got corrupted so that Graham Cluley's account pointed at Carole Theriault's account or whatever.
It's obviously just sheer incompetence.
I thought, "Well, hang on, what's going on in T-Mobile security team?" So I did a little bit of searching.
In middle of August, T-Mobile announced it was laying off 5,000 members of staff, mostly working in corporate back office and technology roles.
So I wonder, is this why a bug like this managed to creep out there and was rolled out in this, quote, technology update?
Some people actually, when the layoffs were announced, if you look back on some of those reports in mid-August, there were cynical journalists who said, "Well, I wonder if there are going to be more data breaches which follow because T-Mobile does have something of a poor history when it comes to securing data."
Smashing Security, where hackers have stolen millions of customer details, names, phone numbers, billing addresses. It's happened in 2018, happened in 2019.
They stole employees' information and their emails and their customer account information in 2020, in 2021.
In April, and now this, now T-Mobile wants to set the record straight on this one.
And T-Mobile came out quite loudly and said, "Nothing to do with us.
It's actually a third party called Connectivity Source." And it was their customers and their employees who've had their names and socials and all that kind of detail stolen.
Now, I went to Connectivity Source's website to find out more about them.
If you did business with Connectivity Source, you would think you were dealing with T-Mobile.
So yes, maybe it technically wasn't T-Mobile who was breached in that case, but I think many of their customers may have imagined the company was actually T-Mobile.
You should always review them so you can complain whether you get money going out or coming in that you didn't expect.
But if you think you're at potentially higher risk than usual, just make sure that if you see something, you say something, because the sooner you point it out, the more quickly it will be sorted.
How many times has this sort of thing happened and it hasn't been made public, or maybe even T-Mobile itself doesn't know about it?
If it's happening with this regularity, you have to say to yourself, well, you know, am I sensible being a T-Mobile customer? Would I be wiser to go elsewhere?
Now, I'll start by saying it probably wasn't a great choice of name because when you say something, something, something bleed, everyone thinks of Heartbleed, which is that infamous bug from what, 2014, I think it was, where OpenSSL leaked data.
And so I like to reserve that word bleed for bugs where you can't really control it.
It's just that data comes out in the wash, and if you milk that leaking data systematically enough, eventually you end up with a giant bucket full of stuff that you can milk for potential secrets.
Now, this is a little bit different because it relates to a specific vulnerability that fortunately Microsoft patched this Patch Tuesday, and it goes around Windows theme files.
So, you know, it's the kind of thing that if you're a Linux user where these things are more flexible and more competitive, if you like, there's a whole world of themes out there, ones where the contrast is so terrible that only hardcore hackers can read, you know, brown text on a black background because why make life easy?
All of that sort of stuff.
And I guess Microsoft puts a lot of effort into making its own themes look quite neat, but even on a default Windows 11, you can go in and you can say, well, I want to re-theme my computer.
So instead of everything looking bright and high contrast, I want it a slightly darker theme, or I want lower contrast or whatever.
And these themes are controlled by files that imaginatively have the extension .theme. Theme, right? Right.
And if you go to the right place on Windows, you can just search for a file called Aero, Aero.theme.
And if you open it up, not by double-clicking on it, but say open it in Notepad, you'll be amazed to find, and you'll love this, Graham, from your early days as a Windows programmer, it's a good old .ini file.
And so you think it's just a text file, it should be mostly harmless.
And the idea is that that theme file, which is just text, so it can't execute, it's not a script, can contain a line that says path equals, and then it gives a file reference to, if you like, the secondary part of the theme.
And so MSStyles files, weirdly, well, not weird, it's not weird what they contain.
They contain things like Windows resources, text strings for localization, little buttons and, you know, all the widgets and gadgets and smidgets that you need to theme the appearance of the computer.
And you think, well, maybe they'll put it in a zip file or maybe they'll put it in an MSI file or some kind of well-known archive.
Amazingly, these MSSTYLES files are stored as Windows executables, so-called PE or portable executable files, but files that have no executable code in them, which is really weird, but obviously, it is weird.
Now, Graham, I thought weird when I heard that, but when you think about it, it's not such a crazy idea because as you remember from your Windows coding days, the nice thing about Windows executables compared to the old DOS-style ones is that you didn't just have to have executable code.
You could pack in your icons and your resources and your text strings and all that stuff.
And it's fairly easy to validate that a program doesn't have an executable section.
And so it means that that file can then be processed with normal Windows processing functions to get out things like resources, string names, buttons, bits of bitmaps, all of that sort of stuff.
And of course, because it's a Windows executable file, it can be digitally signed using the same technology and checked with the same API calls that a program would.
So actually, amazingly, the bug wasn't caused by the fact that this style file is a thinly disguised executable.
It's caused by a secret feature that a researcher called Gabe_K discovered when he was decompiling the theme processing part of the Windows operating system.
He discovered that when it's reading this file, one of the things it asks the file for is, what's your version number?
And, you know, themes haven't evolved much, it seems, in Windows, even on Windows 11. The version number you'd expect today is 4.
So I presume it started at 1 and it's gone up exactly 3 times. Great.
But in the code, there was this weird bit that said, if the version number is 999, which coincidentally is the UK emergency telephone call number for our overseas listeners, then hey, do this special thing.
And this special thing is run off, find a DLL with a weird name. It's _vrf.dll. I've no idea what it stands for.
Maybe it's version revision function or version revitalization feature. Who knows?
So by poking this weird undocumented secret version 999 into this executable file that isn't an executable file, you trick the system into going and fetching a DLL and running it, presumably so that you can, as an emergency way of handling new file types before they're built into the operating system, fully or something.
Now—
Now, the good news is, of course, the programmers didn't go, okay, we require that the style file gets digitally signed, but we'll let you feed it any DLL.
So the DLL, when it comes back, is checked for a valid Microsoft digital signature. But it has what is known in the jargon, it's one of my favorite names for a bug.
It sounds like a character out of Tintin comic or something. It's called ToCToU, which is time of check to time of use. Basically, the code goes like this.
Open the file, read in the DLL, verify its digital signature, close the file, then load the file. And there's many a slip 'twixt the cup and the lip.
Because it turns out you can actually put the path name to be somewhere remote so that when Windows calls home to get the file, if the attacker controls the server that's serving up the file, they can determine, ah, it's the first time they're asking for the magic DLL.
Let's feed them a Microsoft-signed file. You can actually, it seems, just feed back a style file, even though it doesn't have executable code in, it's got a valid signature.
And then immediately afterwards, you see a second call coming in saying, hey, send me the file again. And guess what? You just feed it whatever you want.
You feed it a rogue DLL and poof, pwned.
It's the kind of thing that code reviewers go, oh, it's too hard, I don't want to ask.
You know, I'll be able to get in and jiggery-pokery about it if I have a secret route in.
It just didn't check in the way that if you were doing it in mainstream code, you'd probably do it because it—
It's just a coder thinking, you know what, I've got the specifications, I'm gonna do it like this, but I know what's going to happen.
It reminds me, you know, the very early days of development of the Apple Macintosh.
Apparently Steve Jobs had this religious zeal that said, you must not allow more than 100 and what was it, 128 kilobytes of RAM. I don't want this thing overheating.
I don't want too many RAM chips in there. It will never need more than 128K. And the developers just knew because the operating system was gonna be quite big, it wasn't enough.
And they secretly enabled it to be able to take up to half a megabyte, and nobody noticed except them. They kept it a secret.
And when it came out and people were complaining, oh no, there's not enough RAM, guess what? They had some headroom and it saved the day. So yeah, I guess code 999, folks.
If there's something that people want in themes or something that doesn't work, we can feed in this VRF, version revision feature.
And my advice is, even with the best will in the world, if you're a coder, don't do that. Your intentions may be entirely honorable, but is it the play Julius Caesar?
The evil that men do lives after them, the good is oft interred with their bones. And you know, that's sort of what happens, right?
Yeah, he's enjoying the conversation so far about—
To be honest, I'm actually imagining that Carole's sitting there and has got the flat white, which means I've probably got, if we're at the right coffee shop, my favorite place in Oxford to get an Americano, and I'm just enjoying it.
Having satiated our appetites for remembering the not so good old days, as well as the fab ones. And, you know, that should be that.
However, unbeknownst to us, imagine that we have been gossip TikTok'd. What is that, you say? I know you're dying to know.
What? Exposing them for gossiping about— in our situation, it would be exposing us for gossiping about a guy called—
And the idea is to alert the person they're shit talking about to let them know that they shouldn't be friends with these people.
But this whole viral — I hate the word — but popular TikTok meme started gaining popularity according to Know Your Meme, right?
Because this TikToker posted a video in September showing a group of women at brunch badmouthing someone named Sarah.
And the TikToker reportedly explained on the video, addressing Sarah, they said that your coochie was out, you dressed sleazy.
And then the TikToker points her camera at the table where the gossiping is going on and says to the viewers, hold on, I'm about to show you exactly who's talking about you, Sarah.
And cue the amateur TikTok sleuths who digitally take flight to try and identify Sarah and warn her.
Because these gossip TikToks take few skills and potentially is limitless.
Because according to Rolling Stone, these types of posts tap into every requirement TikTok's algorithm rewards. It gets shares, it gets comments, it gets bookmarks.
A TikToker tells her 160,000 TikTok followers that she's overheard a table of 3 bridesmaids gossiping about their wedding that they were recently in.
And the TikToker says in the video that the gossip went from tame to sinister, describing the women complaining about the bridesmaids' dresses, the wedding flowers, and how they were asked to style their hair.
And she says in the video, you know, so she kind of goads it because she goes in the video and she goes, when I tell you, if I were that friend and I knew that these girls were talking about me like this, I would throw myself into traffic, right?
This is a girl who has 160,000 followers and this was viewed more than 1.2 million times. And what seems to be concerning is the call to action afterwards, right?
So here's the story, find the person.
And presumably if you're the kind of person who gets off on making these videos, then you kind of don't even need them to be real, do you?
You can just film people talking about something and then just claim that what they were talking about was X or Y or Z or person A, B, or C, and sort of whip up a frenzy even though the conversation may have been either mostly or wholly innocent and not necessarily even referring to the individual concerned.
So something like that can go an awful long way.
And with the right sort of hints in the follow-up video, you could trick people into — air quotes, giant inserted here — finding the wrong person if you wanted.
You know, to shame my patron. And I wonder if the actual establishment has any recourse.
And of course, what the fuck, like TikTok, do they not have any recourse for this either, to allow this to happen?
And, you know, it begins to escalate into potentially thousands of people resharing it, say, does anyone recognize these guys or whatever?
But surely there's a potential here, though, as well to use technology because I was reading a story about this this week goes one step further as to what's going on on TikTok.
So there's an article by Joseph Cox.
Joseph Cox was working for Vice and he and some of his mates have left Vice and they've now set up their own organization, 404 Media, where they're doing some great reporting.
Yeah, so, but anyway, they've been looking at this because there are now TikTok accounts where you can actually ask them, identify the person in this video.
And what they will do is they are taking screenshots.
They're grabbing people's faces who could be in the background of videos or could be in the foreground, they're then putting those faces into sites like PimEyes, which we've spoken about before.
So PimEyes is a facial recognition database which spurts back at you people's employment, where they live.
And so you could take this video you're talking about of these bridesmaids or whatever.
And rather than just, does anyone recognize them, pass them over to these TikTok accounts who are offering to do this for you using facial recognition technology.
So they don't need to be using facial recognition. They could just have a bevy of followers hoping that one of them knows them.
It doesn't matter what the technology is that finds the person. They're there acting as unpaid, let's take our revenge on society.
They then create their own video, which contains at first the original video and then has, it sort of pops up or something, the request from one of their followers.
Can you tell me who this guy is because I fancy him or something? And then up comes their social media profile and everything else and their name. And so.
And people are feeling violated because they think they just had an innocent conversation with someone in a, you know, there's one guy who was, who said he was on holiday in South Africa and he, you know, someone just quickly filmed a little interview with him.
Other people saw it and were intrigued as to who he was. And before he knew it, he was getting emails at his work.
And thousands of friend requests and all sorts of things, which he did not want. And he didn't want his name out there.
And the guy sitting with a hat with, you know, proverbial, the big wide-brimmed hat with corks on strings, which is supposed to mark him as an Australian.
And he's leaning over and saying to the guy next to him, "Oh no, I'm not Australian, I'm English.
I just don't want to get recognized by my boss because I called in sick this morning." You're just figuring that in the old days, you might get on television for a moment when the camera panned around the crowd.
So yeah, I don't know how you police that though.
So it's called the egg crack challenge. Okay. And I've just put a link inside the show notes for you.
And then someone somewhere thought, hey, why not just do it on toddlers and children and babies? Fun. So, you know.
I've got a solution to both this, both Duck's problem at the cricket match and to the egg crack challenge, which is we should all follow the guidance set by Lord Buckethead.
And I don't know if you remember Lord Buckethead. He is a political candidate who stood in various British general elections with a great big bucket on his head.
So, when Boris Johnson or whoever, when a major political politician is up for election, you'll often get these sort of joke candidates as well.
But if we all wore buckets over our head, that would stop our bosses recognizing us and stop the egg crack challenge.
With Drata, you don't have to spend hours collecting evidence, manually testing controls, managing spreadsheets and screenshots. And pestering other teams with requests.
With automated evidence collection, over 85 integrations, and 24-hour monitoring, Drata automates the compliance process and keeps you audit-ready all year round.
Drata supports over 16 frameworks, including SOC 2, ISO 27001, GDPR, and HIPAA. And with an open API and plenty of customization, you can build your compliance program your way.
With over 475 5-star reviews, Drata is the highest-rated cloud compliance platform on G2.
Countless security professionals from companies like Notion, Lemonade, and BambooHR have shared how crucial it's been to have Drata as their trusted compliance partner.
Listeners of Smashing Security can get 10% off Drata and waived implementation fees at smashingsecurity.com/drata. That's smashingsecurity.com/drata.
And thanks to Drata for supporting the show.
For the past few years, the majority of data breaches and hacks you read about have something in common. It's employees.
Hackers absolutely love exploiting vulnerable employee devices and credentials. But imagine a world where only secure devices can access your cloud apps.
Here, credentials are useless to hackers, and you can manage every OS—even Linux—from a single dashboard.
Best of all, you can get employees to fix their own device security issues without creating more work for IT. The good news is you don't have to imagine this world.
You can just start using Kolide.
Kolide is a device trust solution for companies with Okta, and it makes sure that if a device is not trusted or secure, it can't log into your cloud apps.
Visit kolide.com/smashing to watch a demo and see how it works. That's k-o-l-i-d-e.com/smashing.
Gigamon's latest survey of over 1,000 global leaders reveals the state of hybrid Ransomware and Ransomware Threat Cloud Security and the dangers that free-flowing encrypted traffic poses to organizations.
Find out more. DownloadTheReport.com/Smashing. That's G-I-G-A-M-O-N.com/Smashing. And thanks to Gigamon for supporting the show. And welcome back.
Can you join us at our favorite podcast part of the show, the part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they like.
It doesn't have to be security related necessarily.
My pick of the week this week is a documentary which I watched last night on the old Netflix. It is all about freediving. Have either of you had any experience of freediving?
I mean, have you ever gone to the bottom of a swimming pool and picked up a brick or something else unpleasant on the back of the bottom of a swimming pool?
And it tells the story of her and Stephen Keenan, who's an expert safety diver. So they have— because this was the thing, right.
So Alessia and her fellow freedivers, they go down 100 metres or whatever and come back.
But of course, they run out of air, right, because they're going very, very low down on one breath. They may be down for 4 minutes or whatever. Extraordinarily long time.
I was actually reading while preparing for this that the world record, there's some chap who goes freediving and he holds his breath for 24 minutes. It's insane, isn't it?
Absolutely. But anyway, so in this documentary, which is a beautifully filmed documentary, they show some of these people.
And of course, as they're coming back up, which is quite difficult in itself, they're almost out of the water. And quite often at that point they black out.
This is quite a common occurrence. And so there are safety divers there ready in case they black out because they have to revive them.
Because if you black out and your brain isn't getting any oxygen, obviously you could be brain damaged within a couple of minutes or dead.
So it's quite horrific, quite an extreme sport. Anyway, Alessia, this expert safety diver Stephen Keenan, she ends up in a relationship with.
They are training and they are attempting to cross an infamous underwater arch in Egypt, which has claimed over 100 lives. It's very far down. They're going to go under this arch.
Right at the very beginning, you see this woman descend into deep, deep water. And you just follow her the whole way. It's over 3 minutes.
And in your head, you're thinking, how can she still not have breathed? It's just going on and on and on and on. It's a love story. It's also very emotional. Did you cry?
Carole, you know me. No spoilers, but it's a bit of a—
I'm desperately trying to do the right thing by my soon-to-be former boss who'll get my emails after I've left in case there are any bills left.
Because I've just got so used to, particularly to all the PR spam that you can imagine has built up after however many decades of dealing with journalists.
I've just got used to ignoring it and just mostly hitting delete. But I think some of it, lots of it just gets left behind.
I suddenly actually started looking at a few of them today to see if it was worth unsubscribing.
I realized that maybe this is a newish thing, but I've just missed how truly understandable so many of the communications from people who claim to be communications experts are.
The people who go, "I'm looping this back to the top of your inbox because obviously you didn't have time to look at it" by replying to their own mail, as though you're just thinking whoever fell for that?
I drove around it really carefully. But then this morning I got one that said, and it was a PR release about, I need to talk to this person.
And I kid you not, I've had to remove some of the words to make it into even into a sentence. But it says our CEO is available to discuss GDPR in NHS, DSPT and DTAC compliance.
And I thought, you know what, when it comes to health services, I'm really just looking for you to recommend some kind of lotion for a little insect bite I got.
And there weren't too many acronyms, if you think— So what's your pick of the week?
Oh, this is supposed to be something that I pick because it's really great and you should do it too.
Also, another example of this, I think it was Twitter I logged out of in my browser rather than on my phone.
And I got a message along the lines of, I think it goes something like, thanks for logging out. You can log back in again later if you like.
And I'm just going, I would never have known if you hadn't told me. You made me create an account. It took quite a while. I got to think up a password and give you my phone number.
Not anymore. They don't do phone numbers.
But you know, for two-factor authentication, I would never have occurred to me that because I had to log in in the first place to use the account, that I might ever want to log in again.
So that's my pick of the week is, come on, people. Communication isn't that hard, is it? Not that I feel strongly about it.
And that is Naked Security, which we've talked about already.
We had a meager budget, we had little time, but somehow we pulled it off, and it was fun, right? We had some good times, and we took—
We reported on breaches, arrests, campaigns, widespread malware, proof of concepts, everything.
And I like to think they did it more quickly because we made a keen point about it. And it wasn't drum banging. It was just saying, you guys can do this. You really can.
You know, you're big enough to be able to get everyone across the line. And bless their hearts, love or hate Facebook, they were the first big org to do that, weren't they?
And everyone else followed suit afterwards.
And my browser says connection not secure. Parts of this page, such as images, are not being transmitted securely. So I don't know, mate.
Duck, I don't know if you've still got any contacts you can speak to. There may be some HTTP maybe on that page these days.
To celebrate the return of Star Trek movies.
And I thank both of you for helping us make it. We created it together. We kept it alive. There are other people as well, like Mark and Anna and everyone else who's involved.
And it was cool.
Anyway, I'm sure lots of our listeners would love to follow you online, Duck. What's the best way for folks to do that?
And yes, if you think that you could do with a fantastic writer, speaker, evangelist, company proselytizer, and person with a cybersecurity social conscience, I am looking for work.
Follow Smashing Security in your favorite podcast apps such as Apple Podcasts, Spotify, and Overcast.
For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 340 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Paul Ducklin – @duckblog
Episode links:
- T-Mobile customer reports privacy breach – Twitter.
- T-Mobile US exposes some customer data – but don’t call it a breach – The Register.
- T-Mobile denies new data breach rumors, points to authorized retailer – Bleeping Computer.
- Connectivity Source – Despite appearances, don’t confuse it with T-Mobile.
- ThemeBleed exploit is another reason to patch Windows quickly – MalwareBytes.
- If I Embarrass My Baby on TikTok, Will He Stay My Baby Forever? – New York Times.
- They Gossiped At Brunch. Now There’s a Mob After Them – Rolling Stone.
- The End of Privacy is a Taylor Swift Fan TikTok Account Armed with Facial Recognition Tech – 404 Media.
- Egg crack challenge,the last baby is so cute – YouTube.
- Trailer for “The Deepest Breath” – YouTube.
- “The Deepest Breath” – Netflix.
- Naked Security.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. It’s Device Trust for Okta. Watch the demo today!
- Gigamon – Download the Gigamon Hybrid Cloud Security Survey to learn about the hidden dangers of encrypted traffic.
- Drata – With over 14 frameworks including SOC2, GDPR, HIPAA, and ISO 27001, Drata gets you audit-ready for crucial security standards needed to scale your business. As a listener to Smashing Security you can save 10% off Drata and have implementation fees waived.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on Mastodon, on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
