
Computers blue-screen-of-death around the world! The Paris Olympics is at risk of attack! And the FBI pull off the biggest sting operation in history by running a secret end-to-end encrypted messaging app!
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by industry veterans Graham Cluley and Carole Theriault, joined this week by cybersecurity journalist and the author of “Dark Wire”, Joseph Cox.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security episode 382. My name's Graham Cluley.
It is cybersecurity investigative journalist and the author of a new book called Darkwire, Joseph Cox. Hello, Joseph.
I know you're going to be talking to us a little bit about the story behind Darkwire later on in the podcast, but do you want to give a quick summary for those people who haven't seen the book yet?
An app that was very popular with drug traffickers and hitmen and money launderers. They used it because they thought it was secure, but it was the FBI basically the entire time.
And I think it's especially relevant now because we're all talking about encryption and stuff again in the news that I'm sure we'll get into.
But yeah, I hope it's a very entertaining and informative read for your listeners.
This was all super recent, and the FBI came clean on June 7th, 2021. I don't think my publisher planned that, but that was beneficial.
You can't have avoided missing it when CrowdStrike, a cybersecurity company, of course, which normally stops hackers from bringing down computer systems, pushed out an update which brought down computer systems.
It's causing chaos at airports, affecting banks, hospitals, government offices, media outlets, and other businesses all around the world.
Tonight, a major IT outage shuts down computer systems worldwide after a day of worldwide IT chaos caused by a global outage.
The boss of the cybersecurity firm responsible has said it could be some time before all systems are back up and running. But we begin with that massive Microsoft technology outage.
Cybersecurity firm CrowdStrike says it identified a critical problem in its software and is working to fix the issue.
And 8.5 million, it is actually an awful lot.
Even though it's less than 1% of all the Windows computers out there worldwide, the impact was significant because of course many large companies use CrowdStrike to protect systems that are essential for critical services.
And in fact, we sometimes forget that we, the good side can make mistakes that can screw stuff up royally.
But we remember the chaos within the company and that was a lot smaller than what happened to CrowdStrike. I mean, thankfully we weren't making international news headlines.
Thankfully, we weren't knocking out television stations, airlines, and everything. But it took some companies weeks to recover, didn't it?
And our support people were working round the clock at the time, and it was horrendous. So we can understand this.
Now, this CrowdStrike incident, it was bigger than, for instance, the WannaCry ransomware attack, which impacted the UK's National Health Service.
It caused a number of US airlines to ground their flights around the globe for much of Friday. Sky News and CBBC in the UK, they went off the air.
It's not a deliberate attack. It's an accidental outage which has occurred through the software which is meant to be defending you.
Not only is it exceptionally disruptive — I mean, I think actually at the time of recording this, there are still disruptions to some airlines.
I've seen tweets where people still can't get on flights home because it's been that disruptive.
But as you allude to, this is the software that was supposed to protect you in the first place, and it's actually done more damage than you mentioned WannaCry, but I guess NotPetya as well.
I mean, it's sort of hard to quantify, but this has been staggering, absolutely.
Their tills were brought down early Friday morning.
He was third in line to pay for his early morning breakfast burrito because he was going away on honeymoon to Barcelona.
And he very bravely waited a few minutes as he got frustrated that suddenly the tills weren't working before stomping off.
Thankfully, my flight wasn't affected, but thousands of other people were, of course, affected by this.
And a breakfast would have been nice. But anyway, doesn't matter. You know, hey, I'm just reporting what happened. Anyway, affected PCs around the world, they entered this death loop.
They were showing the famous or the infamous blue screen of death upon boot up, making them essentially a brick, unusable, tricky to fix.
CrowdStrike, to its credit, fixed the issue within about 30 minutes or so. They worked out what it was, what they had to do.
But that didn't mean that the affected computers could automatically fix themselves. It's just like the situation we had, Carole, when we worked at that company.
Even though you had the fix, getting it to the customer or getting it applied was really tricky.
And Microsoft was saying that some computers would need several reboots.
In some occasions they're saying it may have to take up to 15 reboots before the actual issue would be fixed. So this was a huge, huge story.
And of course, whenever there's a catastrophe in the cybersecurity industry, there will be people thinking, we can maybe make something out of this because CrowdStrike's rivals, some of them couldn't resist going in and putting the boot in.
And it was kind of ironic what we saw Kaspersky do.
Now, Kaspersky, of course, well, hey, they've been in the headlines quite a lot, particularly in America, where they've shut down their operations now because America's banned them from selling or updating their clients over in the States because of concerns that Russia may have too much influence over them.
And Kaspersky, they tweeted a picture of the blue screen of death, which CrowdStrike customers were seeing. And they said, you wouldn't see this with any of our products.
They said, just saying.
I wonder if that's just a social media person doing that.
So other people reading the tweet said, "I think we should put some context." And what they did was they said, "Actually, all computer programs can have bugs, including Kaspersky products." And they linked to Kaspersky knowledge base articles talking about blue screens of death it has had in the past on multiple occasions.
You can't remove it, we'll get more headlines!" They should have just posted an apologetic tweet.
But it could happen to any of us because cybersecurity products work at such a low level on Windows computers at the kernel level because of course they're trying to get past all the devious tricks that the malware is doing.
They're trying to see what's really, really there. And of course, when things go wrong, they can go really, really badly wrong.
So it looks bad for the whole industry when one product fails in this way. But to be honest, it could have been just about any of them.
It's only proper quality control and testing, which is going to prevent this sort of thing happening on other people's computers.
There was a theory that CrowdStrike were deliberately trying to wipe some of their customers' PCs of evidence, which would—
I swear it wasn't always like this. Obviously social media is still a relatively new technology, I guess I would say, in the grand scheme of things.
But it just seems so, so much worse now. Every single story will have something, an angle like this.
And I mean, I guess that's a question to, I mean, not us right now because we're mocking it, but you sometimes have journalists who will cover every single conspiracy theory and say, hey, look, this is what the silly people are saying and writing about.
I don't know, maybe don't amplify it. I think it's a case-by-case basis, but I don't know.
And they put a question mark at the end. And of course, it gets them the clicks, doesn't it?
If you remember when the DNC, the Democrat Party, got hacked in 2016, Hillary Clinton's campaign, and CrowdStrike were one of the companies who came in to help the DNC work out what had happened when they were attacked.
And there were links made then.
And so again, we're seeing conspiracy theorists saying, "Oh, this must somehow be linked to all of that as well." Carole, what conspiracy theories did you hear about this one?
He says that the outage might be linked to a UFO sighting over his home in St Albans near Luton on the same day.
He said, some sort of higher intelligence that's doing this, I don't know. He then puts this shameless plug in for his movie.
He says, I've alluded to this in my new film, The Cosmic Joker, which is now streaming.
There was a bit of breeze, so it would've had more movement. It seems to be blipping in and out." Can't argue with that.
I'm, oh, we should— this is true. I don't care. I'm just going to believe it.
As normal, it's all about the cock-ups. It's never really a conspiracy, is it? It's normally just human failure. Which has actually meant that piece of software has gone wrong.
I can never remember that subtitle, so I'm literally reading it because I think it changed a couple of times.
I can never remember which one the publisher decided on, but it's Darkwire. That's the important bit. And if you Google that, you find the book. So the SEO worked.
So as I said, it's about the FBI running this encrypted app. So I guess what I'll do is I'll give a super streamlined version of that story.
So we can then talk about why this matters today. So in 2018, the FBI is approached by somebody who's in the encrypted phone industry.
And this industry, they sell these very customized devices to drug traffickers and hitmen. You'll have the microphone taken out, you will have the camera removed, the GPS as well.
And they basically become these almost bricks. You know, it barely resembles a normal phone that can send encrypted messages.
And it really does annoy law enforcement, especially in Australia. Europe as well.
But the FBI is approached by somebody who is in that industry and is making the next generation of encrypted phone called ANOM, A-N-O-M.
And they offer it to the FBI and say, would you like to use this in future investigations if you don't prosecute me for charges I may or may not face in the future?
So the FBI says, yeah, obviously we would like to do that. I don't think that's a direct quote. I'm paraphrasing slightly. Smashing Security.
But they say yes, and they basically do become this incubator for this tech startup for the criminal underground.
And it starts in Australia, very, very small, 5 to 10 devices, eventually goes to Europe because one of the key things with encrypted comms and drug trafficking today is they're so globalized.
You will have drug traffickers in Australia who are working with people in Turkey or Europe or even South or North America. Crime groups in silos anymore.
That's just a very, very old idea, especially not just in the 21st century, but very specifically in 2024 and 2023.
So the phones expand, they go to Europe, the FBI is collecting all of these messages.
They're not just getting the content of the chats, they're getting the GPS locations, they're getting photos, videos. It is the ultimate backdoor into a consumer tech product.
We've never seen the FBI get this before. They've always wanted to do this.
You'll all remember San Bernardino, which wasn't Intercept, but it was getting into a phone, and they wanted that. They're always complaining about wiretaps or Signal or whatever.
Well, they did get a backdoor, and this was the case. But it keeps growing until eventually, it really does start to get too much to handle.
Basically, the sellers of the phones who are real criminals, they're not FBI agents.
They are spreading all over the world and the FBI starts to lose control and they have to shut this thing down. And that's one of the major reasons for it.
The DOJ will never acknowledge this, but I found it was Lithuania, and I reported that.
That was the country that was intercepting the messages for the FBI, then handing it over with a nice little bow over to the US authorities.
Now, they could have just got another court order, I'm pretty sure.
So the real reason, to answer your question, why they closed it down is because no longer was the FBI in control of the production of the phones.
That is, there were these little computers that would load the software onto Google Pixel 3s and various other Android phones. That was the case at the start of the operation.
Then the criminals found out how to make those computers themselves, and they could then create as many phones as they wanted at any speed they wanted and give it to any seller across the world.
So it was ballooning to over 12,000 devices at the end, which doesn't sound like a lot, but imagine that's 12,000 probably criminals, and you have to read every single one of their messages.
And it got to the point where they were getting 1 million new messages a day that the FBI had to read through. This is not an ordinary wiretap. This is not Sopranos.
This is not The Wire. It is those, but on a literal global scale. And they just could not guarantee that they were going to be able to read every single message.
And if one fell through the cracks, somebody might die. You know, there's a lot of violence in the underground.
There's Dutch, German, there's Swedish in there. So they do provide the data to those authorities who can then read it through themselves, obviously being native speakers.
But AI does get introduced at least a little bit when the Dutch get involved because they've dealt with massive datasets before in similar operations, and they made some sort of tool where the AI would summarize and surface conversations that it thought it was important, such as, "Hey, this person's talking about cocaine," and it would then bring that in front of the analyst.
That being said, it still requires human review in some sort of way, right?
Because you're going to go out and arrest somebody, or you're going to go out and seize a shipment, or maybe you're going to stop an assassination, which they did every day, basically, for years and years and years.
And I've heard this more and more even since finishing and publishing the book is that the FBI comes clean and it says, we ran a norm the entire time.
The reason being is because they wanted to spread paranoia and distrust among organized criminals so they wouldn't trust these encrypted phones anymore. Right.
And they've been very, they've been very successful in that. The drug traffickers I speak to and the people who sell the phones I've spoken to as well.
They say it's very, very hard to build up a customer base now because all of the drug traffickers are thinking, well, what if the FBI or the Dutch are behind this phone company now?
We can't trust anybody. So at least some criminals are moving over to apps we all use, like Signal. And I think that brings up the key question, which is, well, what happens now?
I don't think the FBI is going to just pat itself on the back and go, well, we solved crime. Let's go home.
But I really think that's a key question right now. And even more so because I feel this actually got buried in some of the coverage and I'm not a political reporter.
So I don't really have access to maybe, you know, the people on Capitol Hill and in the US who would be able to leak this information, that sort of thing.
So I have to read it from Politico or other outlets, but there were mentions that Thomas Crooks, the would-be assassin of President Trump, did use, I think it was 3 or 4 encrypted messaging programs which are based overseas.
They haven't named the apps yet and—
It was somebody just pretending to be the shooter.
But all of that being said, in the same way in 2016, we had the San Bernardino terrorist attack and that started a whole round of the going dark debate around iPhone encryption.
There's a chance that this could trigger a debate around end-to-end encryption, the messaging equivalent.
That being said, I mean, they're still trying to find out a motive, and maybe they could argue, well, we would know the motive if we could access his encrypted messages.
And I don't know whether they're going to do that or not, but the ANOM operation shows the extreme measures the FBI is willing to go to to get access to encrypted communications.
So why wouldn't they try something again, or at least point to its success and then say look, we need to do more.
I imagine a paperback will hopefully come in about it.
I won't get into more specifics than that. I will say that if you're going to write a book, you have to care about it and live and breathe that story as I did this one. Yeah.
I've covered this industry for 10 years, so it was already very clear that I had the sources to do it. So yeah, I mean—
I hope I'm not anywhere near this whatsoever, you know, and I'm just excited to see what they do with it because of course it's going to be a piece of entertainment, right?
And that's of course the idea. But if a piece of entertainment gets more people to care about encryption and what that means, I mean, I'm all on board.
I'm excited to see what they do with it.
So let's see what you guys know about the Olympics.
They have to present themselves as individual neutral athletes, which is a weird statement in itself, and only provided that they meet the eligibility criteria imposed by the International Olympic Committee.
A world event of this caliber is considered a high-stake target when it comes to international threats, right?
Longtime listeners might remember that I covered the previous Olympics hosted in Tokyo, and there were a lot of concerns there too.
First, the Olympics were pushed back from 2020 to 2021 due to COVID concerns, with locals basically saying not my town, thank you.
But on top of that, the Japanese Olympic Consortium was using software as a service, or SaaS software, from Fujitsu, which was evidently infiltrated by attackers and loads of data was hoovered up.
So you can see episode 232 for details on that one. But back to the flaky croissant and crusty baguette munching land of France. They have their own security concerns.
So according to PCMag and a Fortinet report, French officials have already identified more than 300 fraudulent websites claiming to sell event tickets, which are of course bogus.
On top of that, they've seen a significant number of typosquatting domains.
So this is almost olympics.com with just a few typos in it, maybe missing the L, maybe missing the Y, maybe spelling it with I's instead of Y, and all kinds of things.
And just to be clear, I type very quickly, often make typos when I type.
So be careful that you type it in correctly because these sites look exactly like the original and authentic website.
And these schemes impersonate major brands such as Coca-Cola, Microsoft, Google, and the World Bank.
And this is kind of sneaky because these brands tend to use such global events as a springboard for recognition or brand power, that sort of thing.
And they have bona fide competitions and giveaways.
And of course, you see these bad actors taking advantage of this and trying to dupe you into thinking that you're on a legit site and getting a super big win when you're actually handing over your details and cash to some unknown ne'er-do-well.
So Zerofox has seen activity on social media of political groups planning DDoS attacks designed to compromise the network in order to get political messages across.
So all this says, yeah, we definitely need adequate security at the games, and I'm sure we all agree, but at what cost? This is the age-old balancing act of security versus privacy.
How much surveillance is too much of an intrusion on privacy?
Perhaps this is why the French government introduced the controversial Article 7 bill. Have you heard of this, either of you?
So basically, it'll monitor crowds in real time for abnormal behavior and crowd surges, as well as analyzing video data from drones and CCTV cameras.
So think supply chain here, to steeply ramp up traditional surreptitious surveillance and information gathering tools for the duration of the games.
These include wiretapping, collecting geolocation, communications, computer data, and capturing greater amounts of visual and audio data.
Hey, wait a minute, maybe the FBI sold their phone software to France.
Now, I should mention that the Article 7 bill, which France passed back in March 2024, will last an entire year, way beyond the scope of the games.
You can bring in legislation like this and extra surveillance and, oh, well, we have to protect you during this, but are they really going to pull it back?
Whenever you have especially surveillance legislation and you can have these very powerful capabilities like FISA in the US, which is especially useful for counterintelligence and terrorism plots, and it has legitimate use cases there.
And recently when US politicians have tried to have it renewed, the conversation shifted to, well, it's not so much terrorism now because of course the threat from ISIS and Al-Qaeda has diminished somewhat.
It's now we need this to combat the ransomware actors because we use FISA to go after them.
And that may or may not be the case, but it is always interesting that the debate can shift very, very quickly.
Whereas here it starts with the Olympics and then we all go home and then a few years later, "Oh, they're still doing that? Oh, okay." Huh.
They're saying this is a surveillance power grab and that the government will use this exceptional surveillance justification to normalize society-wide state surveillance.
And for me, and I'd like to know what your opinion is, this problem may lie in the nascency of this kind of tech, this surveillance tech, and the lack of regulation or independent testing.
You know, once the data is collected by third parties, the potential for further data analysis and privacy invasions, well, is impossible to gauge, but, you know, could be huge, right?
And of course, it has to be rolled out at some sort of level so it can be road tested, but the Olympics is the biggest cultural event in humanity's history, basically.
And obviously that's also why hackers are trying to jump on it as well, right, as a platform. There could be collateral, basically, and we won't know until it's done.
But I really do wish people would just be ever so slightly more cautious when it comes to rolling out tech like this that, as you say, we don't really fully understand yet.
One of these is a first-timer in the official Olympic Games. Can you guess what that might be?
So athletes need to be able to flip, spin, and balance like gymnasts, but make it all groove to the music.
As organizations continue to shift into larger and more complex cloud estates, legacy detection and response frameworks are no longer sufficient at stopping cloud attacks.
Well, Sysdig delivers fast and effective multi-cloud detection and response, or CDR, capabilities to empower analysts against these accelerated and complex cloud threats.
Powered by Falco, analysts gain the visibility, context, and real-time security capabilities traditional EDR and on-prem tooling fail to deliver.
Learn more about how to stop advanced attacks at cloud speed. Visit smashingsecurity.com/sysdig SYSDIG for more information. That's smashingsecurity.com SYSDIG.
And thanks to SYSDIG for supporting the show.
It's happening at M-WISE, the unique conference built by practitioners for practitioners, brought to you by Mandiant, now part of Google Cloud.
M-WISE features one-to-one access with industry experts and fresh insights into the topics that matter most right now: AI and cloud, intelligence and threats, and beyond.
It is a place where real talk and serious knowledge are shared generously, and where the emphasis is on the practical, tactical solutions.
M-WISE is vendor-neutral and not sales-focused. And this year, they're taking it up a notch in Denver. So get ready for microbrews, killer views, and serious cyber.
Join M-WISE from September 18th to 19th. Get details at smashingsecurity.com/mwise. That's M-W-I-S-E. And thank you to M-WISE for sponsoring the show.
But every day, employees use personal devices and unapproved apps that aren't protected by MDM, IAM, or any other security tool.
There's a giant gap between the security tools we have and the way we actually work.
1Password calls it the Access Trust Gap, and they've also created the first-ever solution to fill it.
1Password Extended Access Management secures every sign-in for every app on every device.
Includes the password manager that you know and love, and the device trust solution you've probably heard of on this podcast, back when it was called Kolide.
1Password Extended Access Management cares about user experience and privacy, which means it can go places other tools can't, like personal and contractor devices.
It ensures that every device is known and healthy, and every login is protected.
So stop trying to ban BYOD or shadow IT and start protecting them with 1Password Extended Access Management.
Check it out at 1password.com/smashing, and thanks to 1Password for supporting the show.
And welcome back, and you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish.
It doesn't have to be security-related necessarily.
I got back from Barcelona, and I would say to you, forget the Sagrada Família and all that nonsense. Goodness sake.
Have they really done that much?
Every room you go into is really big. It's weird.
I've never taken, but I went into this one particular room where they had 360-degree— actually, it's more than 360-degree.
It was like everywhere I looked, there were psychedelic things happening, being full screens on all the walls, mirrors everywhere.
And you were in the middle of what I can only think is the sort of typical evening Frank Zappa had in 1968. It was like a trip.
Much of this museum celebrated Catalan culture, and that was fascinating in itself. But there was one particular room where it was extraordinary.
I lay down and it could have been like I'd taken acid. I could have stayed.
I was there on my beanbag with my new wife, lovingly suspended in the universe, which appeared to be utterly infinite around us. And it was very, very enjoyable.
Impossible to describe. I'll try and find a video to link to in the show notes.
But I would recommend if you ever have the chance to be in Barcelona to go and visit the White Rabbit Museum because it was really good fun. So that is my pick of the week.
Joseph, what's your pick of the week?
For those who don't know, Flight Simulator is a hyper-realistic video game that tries to emulate every part of the flying experience.
So if you are flying an Airbus commercial airliner or whatever, you have to take off the parking brake, you have to do the throttle, you have to do all of this stuff, which sounds really boring, I think, to— well, there's gonna be people who think, wow, that sounds insanely boring.
And the other half is gonna be, that sounds like the sickest thing ever and I can't wait to play it.
And I fall into the latter mostly because I don't know, I just got access to the game and it's exceptionally calming when I spend all day talking to hackers, writing about CrowdStrike, doing all of this other sort of, you know, pretty stressful stuff sometimes.
And I just play it, you know, 30 minutes, maybe 60 minutes if I have time. And I love it. And a new one—
But there's a new one coming out in November, which will be all updated. So I'm deciding, do I play a bunch now to get prepared for that? Or do I wait? And I haven't decided yet.
This is a perfect balance of works over time to fly my little aircraft through the sky and then screw it up and it stalls and it crashes, but it's all good. It's all fine.
I've actually weirdly been reading a lot more about the airline industry just because I'm trying to find stories in there because I just don't think it's super covered, at least in the tech press.
It will be in the trade press. I feel like there's more stuff going on there that I could potentially cover. So that's how I got into it.
It was through work basically that I started to explore just more how the industry works and all of the insane systems and people who were behind it all.
I did ask ChatGPT, they said, of course, of course we can be artists.
But perhaps it's the person directing AI to build these crazy, wonderful works that may be the secret, because I am smitten with Nice Aunties' work, or Nice Aunties' work if you're in America.
So this is a Singaporean artist known as Nice Aunties. Nice Aunties is an art project about aging, beauty, freedom, and fun.
And you're basically in the world where glorious aunties rule the world, known as the Auntiverse.
And they surround themselves with everything they love: cats, food, bright clothing, big smiles. And I love— it's so surreal. And there's a lot of juxtaposing of different ideas.
So, you have a cat inside of a sushi roll. You have aunties partying it up in a hot tub of ramen with their hair coiffed beautiful dumplings.
But they also get out a few powerful messages the environmental crisis, loneliness, isolation.
My favorite is "Aunt Lantis," which is a set of 3 short videos which takes on the poisoning of our seas and waters. And what a way to get the message across.
I asked you guys to check it out before we started recording. Did you get a chance to do that?
Usually it's people who are just hey, look at this crazy thing I made. And it's okay, cool, whatever.
But it was just refreshing to see that somebody was actually engaging with a topic rather than just using AI for the sake of using AI, if you see what I mean.
And she didn't have a chance for a proper education and worked in a rubber plantation from an early age before entering an arranged marriage and going on to have 8 children, then ended up with dementia.
So, Nice Aunties aspires to imagine a different kind of life of unbridled freedom for that generation of women. So it's just great. So check it out.
The website is known as niceaunties.com or niceaunties.com. There's a TED Talk, as Joseph mentioned. There are articles, there are socials.
There'll be loads of links in the show notes if you want to go look there and enjoy. And is it art? Do you think it's art? I'd love your opinions, listeners.
And that's my pick of the week.
Well, that just about wraps up the show for this week, and in fact, it wraps up Smashing Security for the next few weeks because Carole and I are going to go on— Hallelujah!
A vacation. So we will be back with Smashing Security in early September, I think we're back, isn't it? So we've got August off.
In the meantime, you might want to listen to other podcasts. Carole is, maybe Sticky Pickles people might want to listen to if they want to hear some more from you.
And Joseph, I'm sure lots of listeners would love to find out what you're up to and follow you online. What's the best way for folks to do that?
Other than that, you can go to our site, 404media.co, not .com. We couldn't afford that at the time. Maybe in the future.
And then, you know, I'm on Twitter and Blue Sky and Mastodon and Threads and LinkedIn.
Smashing Security, no G, Twitter allows to have a G, and don't forget to ensure you never miss another episode, follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
It's thanks to all of you that this show is free.
For episode show notes, sponsorship info, guest list, and the entire back catalog, more than 381 episodes, check out smashingsecurity.com.
Hey listeners, as Graham mentioned, you can still hear us on other podcasts such as AI Fix, where Graham and regular Smashing Security guests Mark Stockley put the world of AI to rights.
But if you need something non-techie, a little lighter, and maybe even a little sillier, check out the Sticky Pickles podcast, which I host with another Smashing Security regular, Maria Vamarsas.
Have a brilliant August and catch you back here in September. Now, where did I put my Negroni?
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Joseph Cox – @josephfcox
Episode links:
- How a single IT update caused global havoc – BBC News.
- Anti-Virus Software Sees Self as Malware, Deletes Itself – NBC News report about Sophos snafu in 2012.
- Tweet about CrowdStrike outage by Kaspersky – Twitter.
- “Dark Wire” by Joseph Cox.
- Inside the Biggest FBI Sting Operation in History – WIRED.
- Trump shooter’s online activity shows searches of rally site, use of encrypted platforms, officials say – CBS News.
- Mass Surveillance – Privacy International.
- 338 sites internet frauduleux de revente de billets recensés à quelques semaines du début de la compétition – France Info.
- From wiretapping to geolocation data collection: AI mass surveillance for the Paris Olympics draws privacy concerns – Fast Company.
- Heading to the Paris Olympics? Don’t Fall for These Scams – PC Mag.
- AI mass surveillance at Paris Olympics – a legal scholar on the security boon and privacy nightmare – Scientific American.
- AI mass surveillance at Paris Olympics – a legal scholar on the security boon and privacy nightmare – The Conversation.
- Paris 2024: Medal table predictions, facts, opening day schedule and records that could be broken – Euronews.
- Paris Olympics 2024: Your ultimate guide – The Telegraph.
- Breaking at the Olympic Qualifier Series – Official Olympics website.
- White Rabbit museum, Barcelona.
- White Rabbit – YouTube.
- Microsoft Flight Simulator – XBOX.
- Niceaunties.
- Auntlantis by Niceaunties – YouTube.
- The Weird and Wonderful Art of Niceaunties – TED.
- “The AI Fix” – podcast with Graham Cluley and Mark Stockley.
- “Sticky Pickles” – podcast with Carole Theriault and Maria Varmazis.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- 1Password Extended Access Management – Secure every sign-in for every app on every device.
- mWISE – Don’t miss the cybersecurity conference built by practitioners, for practitioners. mWISE runs September 18 – 19 2024 in Denver.
- Sysdig – Secure your cloud in real time. Detect, investigate, and respond to threats at cloud speed.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on Mastodon, on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
