
The UK Government takes aim at IoT devices shipping with weak or default passwords, a man spends two years incarcerated after being mistaken for the person who stole his identity, and are you au fait with the latest scams?
All this and much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Paul Ducklin.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, and welcome to Smashing Security, episode 370. My name's Graham Cluley.
Now, coming up in today's show, Graham, what do you got?
Basically, you should start with 1, 2, 3, 4, 5, and every time you think someone's guessed your password, you add 6, then 7, then 8, and just keep on going until it's long enough.
I think the first rule of passwords is don't reuse passwords. Don't use the same password in different places.
It's so hard, no one will ever guess it. Therefore, it's okay to use it 15 times.
By the way, that's a piece of advice which we've given many times before.
This thing about the hackers, first thing they'll do if they grab a password database is they'll try and use it to unlock others.
I remember I once received a legal letter from some chap who claimed that that was his idea and I wasn't allowed to repeat it.
He said, rather like not repeating a password, he threatened me. He said, I'm the person who invented that you can't reuse passwords, so no one else is allowed to say it.
That's the golden rule, if you want to make a password hard to crack. But more importantly than that, don't use the same password.
Well, there is good news because new legislation rolled out in the United Kingdom means that you can say goodbye to your smart fridge having the same password as your email account and your bank account.
I mean, if you've got a password on your email account or on your bank account, you're going to use the same password, surely, to secure your fridge or your video recorder, your CCTV camera.
Wouldn't that make sense? I mean, people are using the same password everywhere. Have the same dumb password.
So if your fridge comes along and it has a default password of admin, you might as well change your bank password to that, mind you.
You might as well change your email password to admin as well, if they let you do that, because, you know, it's using the same password everywhere. That's what people do.
But the killjoys in Westminster, they've rolled out this new law that means manufacturers are banned from serving up default bad passwords on IoT devices.
Made a name for itself.
It has claimed it infected 300,000 or more internet-connected devices, things like video recorders, CCTV cameras, routers, fridges, all kinds of stuff, rather than conventional computers that are traditionally recruited into a botnet.
And then the Mirai botnet launched this massive DDoS attack, denial of service attack, knocked websites off the internet, made them inaccessible.
All because coded inside Mirai were 60 dumb default usernames and passwords. And we're talking really, really dumb.
So you might have a username of something like root and the password would be root or the password would be 1111 or 1234 or 12345. Or one, you can see where I'm going with this.
Because the one thing you can be sure of, and you can find these on regular sites, let alone on underground sites, is that the crooks have a list of pretty much every default password ever chosen by any manufacturer or any vendor for any device.
They're readily available and you just pick the obvious one. Obvious ones like the admins, as Graham says, or the root, root, root, to a root, nothing.
And inside that instruction book, it will tell you what the default password is for setting up the system.
There's lots of gadgets which are still using the same password everywhere.
And this was a brilliant and convenient system because if you happen to lose the instruction book, there was a good chance, as Duck says, that you could just either guess the password or search for it on the internet, because someone will very helpfully have published the instruction book online or created a database of what the password is for your router's admin interface, for instance.
So it would come with a booklet and it would say the password for this smart fridge is, you know, whatever, XYZ, or, you know, password, whatever it is.
Right.
Mine has a little tile that you can slide off the back and it has a unique password unique to your router printed on it.
So even if you don't go in and change it, at least you've got something that's completely different from everybody else's.
And you can take that little tile of plastic and put it in a drawer somewhere in case you ever forget it.
Not only is there not a default, if you don't set one up, you get a half-good password to start with. And I wish more people would do that.
Sometimes what they also do, these devices, is they'll tell you this is your initial password when you first turn it on, but they then force you, or sometimes they ask you, but they could ideally force you to then change your password immediately afterwards.
And make sure that it isn't a commonly used password or isn't a password that's easy to crack and tell you to write it down somewhere where you're not going to lose it.
So it might mean you have different passwords, but it may mean that anybody in the vicinity might be able to determine what the MAC address of your device is.
So again, you want to encourage people to change them.
Because it seems that that might satisfy the law, and then you'll go, oh yeah, well, I put a different password on every device.
But if they're predictable, then they're kind of, that's just a special sort of default, isn't it?
What they're saying is that common or easily guessable passwords like admin or 12345 will be banned to prevent vulnerabilities, to prevent people hacking in.
They're asking that all devices should have unique passwords, but obviously in that scenario we've just described, the password may be unique, but isn't necessarily going to be difficult to determine despite that.
Manufacturers also being told they will have to publish contact details. So if there are any bugs or issues, they can be reported and dealt with.
So there is the penalty, which is that they are going to fine people, or have the ability to fine people.
So the fines, it could be a maximum fine of £10 million, that's about $12 million, or 4% of global revenue, whichever is higher.
Oh, the other thing, the other rule, by the way, is that manufacturers have to be open and retailers will have to be open with consumers as to the minimum time they can expect to receive important security updates.
And I think that's a really important one because there are so many devices being sold on the high street which may only receive security updates for another couple of months or may already have expired and be no longer officially supported, but that's being sold on the cheap.
Now, this has happened often with smartphones.
And particularly with the white boxing of goods, where actually the person that you think is the manufacturer isn't. They've just had a generic device with some slightly reworked—
And you look at yours and you think, no, mine's blue, that's red, mine's fine. So they can actually look quite different, but inside it's absolutely the same.
But it's not just manufacturers who have to abide by these rules, but retailers as well have to be open with consumers regarding, you know, when you're going to get security updates.
So if you imagine that lots of people might buy stuff from— there's a company called Amazon that I know people used to buy things from. Was it 4% of global revenue?
I'm not sure that they'd ever be forced to pay that much, but maybe they're going to have to clean up their act a little bit regarding some of these goods which are just repackaged, but actually the same thing yet again.
You have to sue the other guy. We were just providing a place for you to buy it.
I'd like to see a law that says products that fail to comply with the marketing stuff that we've put on our website faces the 4% of global revenue, because that's how people are choosing to buy stuff, right?
They watch videos, they read stuff and they go, "Oh, this looks pretty good. I'll pay X amount of dollars for this."
Now, fortunately, there aren't many people other than our lovely patrons who are actually giving us money for this. So we may not be applicable to that kind of law.
Duck, what have you got for us this week?
And the core of the story is something that I wrote about on my own website a couple of weeks ago, which is a story that I really thought, "Golly, I can't believe this." I wrote about it on my old site with a picture of Franz Kafka's book Der Prozess, The Trial.
You know, it's a famous book where this guy gets called by a corrupt regime to a trial.
And he figures, "Well, I could ignore it, but I'm really going to have to go there." And they won't tell him what the charge is. They won't even tell him where the trial is.
He has to go and it's just this weird bureaucratic process of this closed loop spiraling around him. And it's obviously a way of drawing into this web of corruption.
It's given us that adjective Kafkaesque, which a lot of journalists complain is overused these days by people on the internet. But here's a story from the US of two guys.
One's called William Woods and the other is called Matthew Kearns.
Now, they met apparently way back in 1988 when they were working together on a hot dog stand in Albuquerque in New Mexico.
And it seems that this Kearns fellow decided that he wasn't going to be hanging out with this guy that he's working on the hot dog stand with forever.
So it'd be quite a cunning idea to learn enough about him and learn his life story up to that point and just keep it in the back of his mind so that if he moved around the country and he needed a spare identity, he could just pretend to be this guy.
For decades, he moved to Oregon, he got married under this other guy's name, he had a child who still has this other guy's surname 'cause that's how the kid was registered.
And he ended up, would you believe it, as a system architect responsible for IT security and system design at a hospital in Iowa, although he's working from home.
And it turned out sadly that William Woods at that time was homeless. So he's unlikely to wander into the bank and say, "Hey, I want a loan" and find out that he can't get one.
But somehow he got wind of the fact that someone was impersonating him. So he did what everyone is recommended to do. Don't let it fester. Go and try and get it sorted.
Went into a local branch. I think he was living in California at the time. Went into a branch of that bank and said, "Hello, I'm William Woods. I may be homeless, but—"
This is like someone who's reporting a lost passport being asked to present the passport to prove that they're allowed to report it lost.
They asked him the security questions that had been set up on this bank account, the validity of which he had gone into question.
The next thing they did, it seemed they went, well, we'll double check. So what did they do? They looked up the phone number associated with the bank account and they called it.
And the fake William Woods answered and said, I am William Woods. There's nobody in California who's entitled to do that.
And basically convinced them that the other guy was the fraudster. He got arrested and of course he wouldn't give up this air quotes fiction that he was William Woods.
He said, no, that's my birth name.
He was hospitalised and he spent something like two years without his freedom until eventually he took— it's not an easy way out, but apparently in California you can agree to be treated by the court as if you're guilty.
It's called nolo contendere or something. I do not wish to contest this. So the court can process you as if you're guilty.
So you can go through the system instead of just awaiting trial, but you don't actually admit guilt. So you're still allowed to appeal afterwards.
And fortunately, afterwards, he managed to contact this hospital and explain the situation. They said, look, we're going to call in the cops.
And a cop in Iowa had this fantastic idea. Well, what we'll do is we'll take this guy that the guy in California says is fake.
And we'll take the birth certificate and we'll go to the person he claims is his father and we'll do a DNA test and we'll see if the other guy seems to be his son. Bingo.
And he's now facing decades. He hasn't been sentenced yet.
He pleaded guilty, but, you know, he's facing some massive sentence, not so much for the fraudulent loans, but basically for lying this guy into prison.
Clearly, if someone comes in saying somebody set up an account in my name, then calling up the person who claims to own that account, it's never going to resolve it properly.
Now, that doesn't mean— so you use a different way of checking whether the person who's turned up is the fraudster or not. Surely. So eventually, this was sorted out.
But there are a few tips that I've got that can help you deal with this.
So my first tip is not, if you ever get a job at a hot dog stand, be suspicious of anyone else, because he couldn't control this.
Somebody had gone off and then some years later had decided to use his information.
So the first two tips really are actually for people like the banks — don't build this kind of closed loop into your system where a potential flaw in the system can simply spiral and make the thing worse and re-re-reconfirm it.
And also, actually test your own contact and validation processes.
So that's really not for the individual — that's for, you know, if you're building a system like this, don't do it on the cheap.
But as an individual, all I can really recommend, given that you can't stop somebody else suddenly deciding, hey, I'm going to pretend to be Graham or I'm going to pretend to be Carole or whatever, is firstly, I recommend that you do try and keep as much physical evidence as you can, actual real evidence with which you can corroborate things like your identity, where you live and your personal history.
And if you lose the documents, then do your best if it's possible to replace them and keep a record of when you think you lost them, just so you have something to give some credibility to your story if you need to challenge somebody else who's claiming to be you, whether they actually have your documents or not, or if they just made it up.
Have a physical copy that you keep yourself somewhere, even if you need to rent something like a safe deposit box at the bank, old school, to do it.
Because after all, if somebody does take over your account, then not only can they see all your stuff, but after they've copied it, they can then go and erase the history of who you were, which would make it much harder for you to re-establish your credentials in the future.
And thirdly, I strongly recommend that you find out and practice, if need be, how the recovery process works for any of the really important services in your life.
I've recently been through this — I lost my wallet two weeks ago.
So I've been through this and, you know, there's not a lot of information until you get into the system because you have to call them and then talk to them, right?
And I'm not sure how they would take to people calling up going, could you just walk me through it just in case I've lost my stuff?
What I really mean is don't leave it until you're in a panic to go and try and find out what to do, because there's a sort of flip side to that tip, which is when you have lost something, be very, very careful about responding to correspondence you get about compromises on your account, because that's an old trick that cybercriminals use.
They will say, "We have detected fraud on your account, we have found your wallet, your passport has been handed in," whatever it might be. Please contact us.
And they will include the contact details in the message they sent you.
And when you're in a panic, when you're feeling nervous, when you're not quite sure, it's easier to fall into that kind of almost a honeypot trap than if you've actually gone and found out the information in advance.
It's easier if you do need to phone up your bank or if you do need to go into the branch and say, "Look, what do I do if I lose my card?" And actually have someone tell it to you face-to-face.
You can't do that if it's 2 o'clock in the morning and you're in a panic, or if you're far away and you've lost your card and you want to do something right now.
But it might be a guy you used to work on a hot dog stand with. And that, I think, is something we can all— I've even tuned it specifically to you for that one, Doug.
I hope you appreciate it.
This is because 2023 ended 5 months ago, and experts out there have had time to review their findings and pull together media-savvy reports to help us better understand what's going on out there.
Recently reported in The Guardian, UK fraud more than doubled in 2023 to £2.3 billion, marking it one of the top years for scams in the last two decades.
And even UK banks have warned of an epidemic of scams. Barclays said last year that more than 70% of scams were happening on social media, online marketplaces, and dating apps.
No surprise really, London and the Southeast of England remain the biggest UK fraud hotspots with a 43% increase in reported cases.
Now I took out the ones like impersonation scams and phishing scams and romance scams because we talk about that all the time.
But here are a few terms that I was less familiar with and maybe our listeners are too and maybe you guys are too. Have you heard of the term ghost brokers?
So after making a sale, the scammers send their victims fake insurance documents, or they might even take out a real policy but falsify the details such as the age or the address or the history to bring down the premium.
And most victims of ghost brokers, of course, don't even realize that they've been scammed until they need to make a claim, which of course doesn't go through.
And these things apparently tend to be canvassed on social media and word of mouth. But I'd never heard that term. So ghost brokers, that's one.
You certainly get a massive fine and can get banned from driving.
And technically, I guess it's not really an excuse to say, well, I bought this policy and now it turns out it's invalid. Your duty is to know that. But how do you tell?
They said you were older and you lived in a safer postcode, or it's completely fake, right?
I don't have a car anymore, but when I had a car, you just get this thing through the mail and it's a certificate and it looks— I mean, these days it'd be 10 minutes' work with a scanner to make a fake one.
It never occurred to me in the past that I should then phone the company up with a number I got myself and say, "Can I just confirm this?" That I exist, yeah. That this is real.
Yeah.
It can't be that big a deal really, can it, compared to traditional phishing? I'm not sure.
Like in some cities and towns in the UK now, you can no longer pay for parking with a credit card or with cash, right?
So drivers go to the parking thing, you know, where you used to put in your credit card or used to put in a £2 coin, and it just says pay by phone. You go, I haven't got the app.
There's a QR code and it's— ah, they're stuck on the machine because they're kind of new.
You know, you're away from your car, it's technically illegally parked. I can see why people would go down a rabbit hole with that. Okay.
You'd have QR codes on the table. So people got really familiar of all ages, Graham.
Maybe you didn't, but most people got really familiar with QR codes during that, and they trust them. Number 3, cloaking. Cloaking.
This is where malicious adverts are able to get past a social media firm's review stage because fraudsters have hidden their intentions.
So when the advert is first placed on Facebook, the link goes through to a harmless page, one that doesn't try to con you out of your cash.
But once it has been approved by the Facebook dudes, the fraudsters then put a redirect that instantly takes people somewhere else.
And when a security researcher, for instance, goes to check it out later, or your guy in the IT department, it takes someone somewhere completely safe.
And they think, well, you didn't have to worry about that. It looks like it really goes to the legitimate site.
So it works by showing an overlay on your phone screen which appears clickable, but in reality it's an image which prevents you from seeing what you're actually clicking on.
So imagine in a mobile game, for example, you may appear to be engaging with the game's elements.
But in fact, your clicks are making in-app purchases or signing you up to subscriptions via an invisible screen underneath the overlay.
Took that approach that one app isn't supposed to be able to paint over the top of another for exactly that reason.
So if you're not getting them from the actual Apple App Store or the Google Play Store or wherever, you know, legitimate place you get your apps, maybe you're at more danger of this.
The final one, AI and deepfake scams, of course, as we discussed last week, it's election year, not only in the UK, but in more than 40 countries around the world.
As more than half the world's population goes to the polls, incentives for bad actors to misuse AI have, you know, probably never been higher.
You could probably say that every single day.
In January, The Guardian reported discovery of more than 100 deepfake videos on Facebook impersonating Rishi Sunak, and these phony clips reportedly led to web pages mocked to look like the BBC News articles, which promoted an investment scam.
So we've heard about these all the time. So all this makes for bleak reading, but there is a sliver of good news.
These losses are likely to be cut down when the government Canada's new fraud strategy, which places a blanket ban on cold calls offering financial services, comes into play.
So in 2024, victims of APP scams must be reimbursed by their banks or payment processors for their losses.
This is according to Forbes. Ah, the UK government has also recently launched a Stop Think Fraud campaign. Have you seen this?
They even say there are many types of frauds with new ones appearing all the time, and there are psychological tactics fraudsters commonly use.
These tactics have as a sole aim of making people act before they have time to stop, think, and check if it's genuine.
And it's one of those things that I've always liked because it's when you do things in a hurry that you're more likely to make a mistake, whether that's calling the wrong number when you've lost your bank card because you're in a panic and calling the crooks by mistake, or responding to something that you think your buddies have posted, but actually they haven't because their account was hacked.
So I think that's great advice for everything. You don't always have to reply to everything the second you see it online, apparently.
Now, there's links in the show notes here to this page, but they go into some detail for how to spot a phishing email, a fake text message, phone fraud, fake online adverts, fake websites, doorstep fraud, and postal fraud.
And all these things are things that we, the public, potential victims, need to do simply in order to keep us safer online.
But I found a really, well, crazy one, just beyond the pale for me. So it's centered around AI scams, and it's based on McAfee research.
And the idea is for people to listen breathing patterns. Apparently AI is shit at breaths.
So according to The Sun, who reported this, a McAfee spokesperson said another marker of possible fake is when the speaker doesn't appear to breathe.
AI tools don't always account for this natural part of speech. And they say it's subtle, it's subtle.
But when you know to listen for it, you'll notice when a person doesn't pause for breath.
So you tend not to hear a lot of the tapping and the breathing and the— I nearly said farting— that goes on in the background. So I wonder whether that's really practicable.
Now you can assess risks, secure the trust of your customers, and automate compliance for ISO 27001, SOC 2, and more with a single platform. And that platform is Vanta.
Vanta's market-leading trust management platform helps you continuously monitor compliance alongside reporting and tracking risk.
Plus, you can save hours by completing security questionnaires with Vanta AI.
Join thousands of global companies like Atlassian, Flow Health, and Quora that use Vanta to automate evidence collection, unify risk management, and streamline security reviews.
Smashing Security listeners get 20% off Vanta. All you have to do is go to vanta.com/smashingsecurity to claim your discount. That's vanta.com/smashing.
And thanks to Vanta for supporting the show.
Smashing Security just made achieving least privilege easy with the Cloud Permissions Firewall, a scalable solution that easily restricts excessive permissions from human and machine identities, quarantines unused identities, and disables unused regions and services without any disruptions.
Even better, the solution maintains this level of risk reduction by automatically enforcing least privileged policies as new identities are added to the environment. What's better?
The fact that you can test drive Sonrai's Cloud Permissions Firewall for free for 14 days. Just visit smashingsecurity.com/sonrai. That's smashingsecurity.com/sonrai.
That's S-O-N-R-A-I.
Well, that's pretty big news since these two companies are leading the industry in creating security solutions that put users first.
For over a year, Kolide Device Trust has helped companies with Okta ensure that only known and secure devices can access their data.
And that's what they're still doing, but now as part of 1Password. So if you've got Okta and you've been meaning to check out Kolide, now's a great time.
Kolide comes with a library of pre-built device posture checks, and you can write your own custom checks for just about anything you can think of.
Plus, you can use Kolide on devices without MDM, like your Linux fleet, contractor devices, and every BYOD phone and laptop in your company.
Now that Kolide is part of 1Password, it's only going to get better. Check it out at kolide.com/smashing to learn more and watch the demo today. That's k-o-l-i-d-e.com/smashing.
And thanks to them for supporting the show. And welcome back and join us at our favorite part of the show, the part of the show that we like to call Pick of the Week.
I thought maybe people are getting fed up with my nitpicks, so maybe I should actually share something truly joyful.
And in a conversation I was having with my partner, oh, how the nights fly by, how we have fun, when we began to discuss, and I wanted to share with you as well, collective nouns.
What a wonderful thing. I got into a spot of bother with her because I referred to a gaggle of women who I had seen, which apparently is an offensive term.
And so this got me looking into—
But I also came across a wonderful list of other collective nouns, which tickled me so much that I wanted to share them with our listeners.
So I'm going to share them with you right now. I'm going to share some of these. So, for instance, we have an absence of waiters.
Depression of weather forecasters. Anyway, I can tell that you two are just as amused by these and delighted by these as I am.
I presume we do, and we're completely unaware of them here in old Blighty.
Maybe listeners, maybe some of our, you know, Swedish listeners, for instance, could get in contact with us and say, we have a very amusing collective noun for saunas or something like that.
Or, you know, which they would be able to share with us. And then my sides at least would be aching with merriment if some of our listeners were to share them.
So I very much liked it. And that is why collective nouns is my pick of the week.
But I think after your— how can I put this— the famous company beginning with A experience from you, I thought maybe I'll try and get something I really liked and was upbeat.
Now, the problem is that it is a pick of the week because it happened in the last week, but there's a 1 in 4 chance roughly that it would happen anytime I was on the podcast.
And that was simply that I went out this last full moon. Which was within the last one week, and you turned into a werewolf.
Okay, no, I love full moons, going, you know, going out in the middle of the night, particularly if you go on a bike ride.
It's quite nice because, you know, you could— you get to see more wildlife. But it was, it was just a— it's a fantastic thing if you don't do it.
You know, you go around about midnight, and it was a miserable day. It was cloudy, it was dark. I thought, oh well, I'll just go out and see.
And as I walked out, the clouds parted and then I went to a little nature reserve that's near where I live and I walked around and it was amazing.
It was actually bright enough to see in color, which you don't normally get at night. You normally see black and white.
And literally as I turned into the driveway to my flat, the clouds closed over and it went dark again and I just thought, Well, nicely done.
And a middle-aged lady walks in one day boasting that she's a high-flying lawyer and yet strangely unable to afford to buy herself a cup of tea.
And feeling sorry for her, our Glaswegian university graduate Richard Gadd offers her a cup of tea on the house.
And this act of kindness flips Gadd's life into a weird and complex hellscape because the lady turns into a pretty serious stalker.
So for over 4.5 years, Gadd says he received 41,000 emails and change, more than 740 tweets, letters totaling 106 pages, and 350 hours of voicemail messages from this woman who he kindly offered a cup of tea.
And Gadd ended up writing about his experiences.
It won an Edinburgh Comedy Award and then was transferred to the Soho Theatre in London for an 8-week run before ending up on Netflix.
And it stormed Netflix with more than 13 million views in the last fortnight and reaching number one on the Netflix charts in 30 countries, including the US and UK.
And Gadd wrote and directed the 7-part miniseries in which he stars as the character Donnie Dunn, which is based on his experiences.
Now, as you say, Graham, there's been loads of hype because Gadd says he fully disguised his stalker's identity, but it seems he didn't do a good enough job as the internet sleuths decided to work out who she is.
There's also harrowing and disturbing scenes between Gadd's character and a known comedy writer, which the internet PIs were determined to find out who it was.
And it got ugly to the point where West Midlands Police stepped in into the fray after a string of false accusations and threats were made on social media against a prestigious theater director.
But all this blah blah, put that aside. I think it is important television. Because I've rarely seen a male character present themselves with such vulnerability.
I, like most women, have experienced not so nice things in my past, and I found the writing and reactions rang really true.
So, it's described by The Telegraph as a show that sucks you into a very troubled mind, and comedy as personal catharsis is taken to a whole new level.
And I would agree with both those statements. I think it's worth a gander, but only if harrowing viewing is in your wheelhouse.
So that's Baby Reindeer on Netflix, my pick of the week.
What is the best way for folks to do that?
And I am P Ducklin on LinkedIn.
Follow Smashing Security in your favorite podcast apps such as Apple Podcasts, Spotify, and Pocket Casts.
For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 369 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Paul Ducklin – @duckblog
Episode links:
- New laws to protect consumers from cyber criminals come into force in the UK – UK Government.
- Mirai – Wikipedia.
- Identity theft victim wrongly locked up for 2 years is exonerated at last – Paul Ducklin.
- Amount of fraud in UK more than doubled to £2.3bn in 2023, report finds – The Guardian.
- 5 scams you need to know about in 2024 – Which? News.
- How fraudsters are getting fake articles onto Facebook – BBC News.
- Five Scams To Beware In 2024 – Forbes Advisor UK.
- Eerie ‘breathing’ mistake to listen out for exposes costly AI ‘audio deepfake’ scam calls that take just seconds to make – The Sun.
- How to spot fraud – UK Government.
- Etymology Monday: David Crystal on the word ‘gaggle’ – Literary Minded.
- Moon – Wikipedia.
- Baby Reindeer – Netflix.
- Why row over Baby Reindeer sleuths will change real-life drama for ever – The Guardian.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Sonrai’s Cloud Permissions Firewall – A one-click solution to least privilege without disrupting DevOps. Start a 14 day free trial now!
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get 10% off!
- Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. It’s Device Trust for Okta. Watch the demo today!
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on Mastodon, on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.


