
QR codes are being weaponised by scammers — so maybe think twice before scanning that parking meter. And in a blunder so dumb it makes autocorrect look smart, the White House explains how it leaked war plans on Signal because an iPhone mistook a journalist for a government insider.
Plus! Don’t miss our featured interview with Josh Donelson of Material and Tony Albano of Google, about detection and response in today’s AI-driven world.
All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Smashing Security, episode 412, SignalGate sucks and the quandary of quishing. With Carole Theriault and Graham Cluley. Hello, hello, and welcome to Smashing Security episode 412.
My name's Graham Cluley.
Now coming up on today's show, Graham, what do you got?
I had the pleasure of speaking with Josh Donelson of Material Security and Tony Albano of Google about detection and response in today's AI-driven world.
All this and much more coming up on this episode of Smashing Security.
There's all kinds of features built into iPhones that no one asked for, myriad of things that they really should do better than they actually do.
Considering the iPhone has been around for almost 20 years, you'd expect it to work a bit better. I mean, for instance, autocorrect, right?
One of those web-footed creatures quacking around.
Why doesn't it do it? Why is it my keyboard cursor, right? You know, the little cursor which appears when you sort of hold down with your finger.
Why does it require the precision of a neurosurgeon to find exactly the right point on the screen to get it to edit your words?
Also, some people say that iPhones suck in other ways as well. The White House, they say that iPhones suck.
But I'm saying the people in charge, the press spokespeople, they have said that phone numbers can be unwittingly sucked into an iPhone, meaning that you can accidentally add a journalist to a top-secret Signal chat.
And I had to say, well, unfortunately, we recorded our podcast that week just before the news broke of SignalGate.
And then we didn't talk about it the following week, which was last week, because, well, why would we? It wasn't news anymore.
But now is the time to talk about SignalGate again, because there is what appears to be a brand new revelation that I think is of interest.
Well, nothing too serious.
It's just Donald Trump's national security adviser, Mike Waltz, accidentally invited the editor-in-chief of The Atlantic into a Signal group chat, where senior officials were casually discussing airstrikes on Houthi insurgents in Yemen.
So this Signal chat had people in it like Vice President J.D.
Vance, the Defense Secretary Pete Hegseth, Secretary of State Marco Rubio, the CIA's director, the director of national intelligence, Tulsi Gabbard, Homeland Security advisor Stephen Miller, and others as well.
Lots of bigwigs.
But it does also require one to be careful about who is in a group, doesn't it?
They were being watched by Jeffrey Goldberg, a Trump-sceptic journalist, shall we say. Someone who's not beloved in the current White House.
Editor of The Atlantic, he was present during this chat group during the build-up to the assault and its aftermath.
And he has now shared some details of what he saw that I think we can pretty comfortably assume was highly classified military material.
And so he said, well, if you think this wasn't sensitive, why don't I share it? Hegseth, for instance, was saying, Godspeed to our warriors.
12:15 Eastern time, F-18s are going to launch first strike package. 13:45, trigger-based F-18 first strike window starts.
Target terrorist is at his known location, so should be on time.
They're talking about drones, they're talking about F-18s launching, they're talking about when the first bombs will definitely drop in capital letters.
All kinds of information about the missile launches.
They hinted that Jeffrey Goldberg, the journalist, must have somehow got himself onto the chat. How did he break in? Has he committed some kind of offense?
And they claimed that nothing illegal had happened at all. No classified information had been shared. They were completely within their rights to use Signal in this way.
Now, we are not interested in the politics on this podcast today. What we are interested in is the cybers. And at first, it sounded like this was carelessness.
The wrong person had been added to a chat group. Now, I would argue that should have been impossible.
If they'd been using their own secure messaging system, there would've been guardrails already in place to ensure only authorized personnel could access the chat.
You couldn't add any Thom, Dick, or Harry to an internal messaging system, right?
I'm just thinking an internal messaging system, maintaining that with their very light-on-the-ground staff that they have, as far as I read.
You've got all these people who you've fired from CISA in the last few weeks.
He's able to run umpteen companies all at the same time and do apparently other remarkable things. Couldn't one of those knock one out?
Anyway, the point is, the expertise is there, the resources and the money is there. They could have a secure system which only allows approved people to join a chat.
But they were using Signal. Now, there may be good reasons why they were using Signal. There may also be bad reasons they were using Signal.
But as good as Signal is, and we use it, right, you and I, it's something used by millions of other people around the world.
Is it really, though, what politicians and government officials should be using? When exchanging sensitive information, especially when Snapchat and Club Penguin are available.
I mean, why not use one of those instead?
You say, well done, well done for not using Facebook for this.
Part of me wishes that he'd said, do you know I'm here, everybody? Hello? Shut up. But that's not how it works, right? You don't get a story that way.
Is it a consumer smartphone that may have vulnerabilities, may have zero days? How are the chat participants connecting to the internet to connect to their Signal chat?
Apparently, some of these people who were on this call were in Russia, for instance. Do we trust that they necessarily had a secure connection and weren't being snooped upon?
So a couple of days after the revelation from The Atlantic, headlines, they weren't going away. It was a bit of a problem.
So Mike Waltz went on Fox News and he said that it was his fault. Either he accidentally added Goldberg to the chat or there was, quote, some other explanation.
But there was no other explanation. He invited Goldberg to the group. But now there are reports which suggest in a way that monumental goof of him adding a journalist to the group.
So there's been a forensic review, they say, by the White House IT team.
Now, of course, that was before they were in power, before the presidential election.
And apparently, Goldberg, the journalist, had emailed the Trump campaign because Donald Trump had said something. Said something insensitive.
And the journalist contacted the Trump campaign to ask some questions.
And Trump's campaign spokesperson, Brian Hughes, copy and pasted Goldberg's message, including Goldberg's email signature, which had his contact details, and sent it to Michael Waltz.
So that he could be briefed about the upcoming story.
Now, it seems that at the point Waltz's iPhone— and this, by the way, must have been a move that will really delight Apple's PR team— Waltz's iPhone merged Goldberg's number into the contact card for Trump's campaign spokesman, Brian Hughes.
So, Brian sent a message to Mike, and Brian's message, which he sent to Mike, was a copy and paste of the message from the journalist, Geoff.
Do you want me to update their contact details? Don't just blindly say yes.
It was still in my hand, but I was answering a question of someone who was talking to me in real life. IRL, I know. And somehow I obviously must have pressed the microphone button.
And so whatever I said to the other person got sent over to this third party. And when I noticed, I was so mortified because I didn't know what I'd said.
I didn't even want to re-listen because you know what I'm like, right? You know what I'm like. I'm like, delete, delete, delete. Which is what I did.
And hopefully the person is never going to bring it up if they listened to it and it was inappropriate. I don't even know.
But all I'm saying is that happened just by sending a message and then responding to something, my hand slipping on the screen, it not being locked. And there you go, right?
A third party gets a message not intended for them.
If you hadn't been using an iPhone, if you'd had a special phone which didn't have that, press a button here and we'll start transcribing everything that it hears into a message which we will send to somebody.
And so he was invited to the Signal chat, but the invite went to Jeffrey Goldberg at The Atlantic instead.
Now, there is a US Department of Defense watchdog which has opened an investigation into its own boss, Secretary of Defense Pete Hegseth, because they're thinking, well, why are you using Signal to discuss government business?
Because there seem to be so many politicians— and it's not just a problem in the United States, it's also been a problem in the UK as well— politicians who are using consumer messaging apps to chat to each other.
And then when there's an inquiry later as to, well, what happened during, I don't know, the pandemic, for instance, or what happened during this particular controversial political situation, what you find is they say, oh, well, I've lost all my WhatsApps now, or I've lost my phone, I can't access them.
And so there's no record. But surely there should always be an audit trail of what is being communicated at the highest level, obviously held securely.
So if later you want to find out what people were saying to each other, you do have that record. And I think that's why so many politicians are using the likes of Signal.
Yeah, because they do want to spy upon people's conversations in these end-to-end messaging platforms.
It's funny how sometimes they really are against these systems and encryption, apart from when they really would like them to work as they wish.
And the latest of all is that National Security Advisor Michael Waltz is now being accused of using Gmail for work-related communications as well.
So again, really seems like a big no-no to me. So everyone be careful. Make sure you're using the right apps and the right messaging systems for appropriate communications.
And also be very, very careful if your iPhone tries to get you to suck up someone else's details and add them to an existing contact. Carole, what's your story for us this week?
Do you have any of those kind of words that you love more than others?
When you do, you're like, "Ah." There's petrichor, isn't there?
And if you read about scams with QR codes, typically I'm seeing stuff related to parking meter scams. Is that true for you as well?
That seems to be the biggest news around QR codes that I can see.
And so they will just scan it and enter their payment information.
So it's not if it brought you to a website that looked like Staffordshire's payment system for the council's parking lots, you would know what to look for.
A report from Juniper Research shows that the value of QR code payments is projected to exceed $2.7 trillion by 2025. That's this year.
We're done with that. We're done with the touch, touch.
But it's even bigger than that, Graham, because even companies Starbucks, right?
They've integrated QR codes into their loyalty program so consumers can make payments and then earn rewards through their mobile app by scanning codes at the point of sale.
So you get one of those cups and then you can scan it right there.
Because I've got a particular bank account, and one of the perks it gives me is it gives me the option of getting a free sausage roll each week.
Nike uses QR codes in their retail stores so customers can scan codes on in-store displays to learn more about products, see reviews, yada, yada, yada.
So one of the recipes touted itself this: scallops are always wow, so make them more often.
An easy recipe with great flavors of honey, garlic, and featuring Heinz tomato ketchup infused sauce.
That's the game plan. And guess what? Because everybody loves them, the bad guys are jumping on the bandwagon.
So just last week, Microsoft warned of several phishing campaigns that are leveraging tax-related themes to deploy malware and steal credentials.
Now, Graham, what do you think is the big problem with QR codes and quishing?
It's not you can look at the URL and think, oh, that sounds a bit dodgy, or why have they misspelt that?
So you just scan the thing and it'd be your mobile phone normally, which maybe doesn't have the room to show you the entire URL, or it's in too small a font for you to be able to read, takes you to some webpage and you just assume it's legitimate.
Well, it seems according to this Fast Company report that most security systems, while they can detect malicious links email security system, for instance, they have trouble analyzing images or QR code content.
So this allows scammers to evade detection and deliver malicious payloads directly to their potential victims.
I mean, there's plenty of security vendors who sponsor this podcast. Maybe they handle QR codes wonderfully.
Actually, if we look at the four different techniques that criminals seem to use to exploit QR codes, so as you mentioned earlier, one is obscurity attacks.
So this is like traditional phishing links, which can be visually inspected, but you can't see where you're going in a QR code.
So that's one of the big techniques that they love to take advantage of. The other one is hijacking switch accounts.
So this is where they would put, like the parking meter thing, they would put a new QR code over another one to try and get you to redirect you to a fraudulent webpage.
So this is where phishing exploits the misuse of shared or leaked QR codes to gain unauthorized access to personal accounts or services.
Now, for example, to drive this point home, a woman in China accidentally shared her restaurant ordering code online while sharing food photos on social media.
Strangers used it to place orders worth 430,000 yuan, or $60,000, directly charging her account.
So this is where unsolicited packages are sent to your address, often using a box from Amazon containing unexpected items.
And these packages may include a QR code inside the box or as part of the letter documentation.
And when scanned, the QR code redirects you to a malicious website designed to steal your personal information. So you could go there and go, I never ordered this, da da da da da.
Yeah, and get your information that way. Now, other than being very wary of QR codes, it's not clear to me that much can be done from a consumer side, right?
Apparently some QR code scanner apps provide a preview of the URL before you open, so you can use these apps to check the destination of the QR code to ensure it matches the expected website.
And also you could have a URL redirect service. So it may not be the first site which you go to.
The first site you go to may be something like TinyURL or Bitly or something like that. And then who knows where you're going to end up?
Because the trusted password manager will not fill in the details of your account if it does not recognize the site. You know, the QR code magically transported you to.
So a bit like you were talking about last week with Troy Hunt's case.
It may be that you are gonna register an account with them, 'cause you've never gone there to park before. And so—
My advice is just don't use them unless you absolutely have to, 'cause I have encountered some instances where you absolutely have no way out of it, and then keep those peepholes of yours open and try and spot any dodginess.
But, you know, if you go to a restaurant and they say, "Oh, just pay your bill with the QR code," you can say, "No, I am gonna pay the normal way, thank you very much." You can obviously have some security software running on your phone to examine the URLs you are going to, which can tell you if it's a known malicious URL, for instance.
This is one which wasn't live a month ago and therefore could display a warning at that point and say you are going to a brand new website.
So if you thought you were going to something established, that is a great indicator that you're going somewhere malicious instead.
It did in the last week or so and could be legitimate.
Constant phishing alerts, endless manual remediation of misconfigurations, and a flood of user reports about suspicious emails.
Teams are stuck between two bad options: letting things slip or becoming the department of no.
So when attackers inevitably get in, they still can't touch the stuff that matters without additional verification.
It's like having a tireless security analyst who handles the routines and frees your team to focus on real threats. And for cloud workspaces, Material.security has your back.
Misconfigurations, shadow IT, ransomware, constant policy changes, Material not only monitors everything continuously, it fixes the simple stuff automatically.
Head to vanta.com/smashing to learn more. That's vanta, V-A-N-T-A, .com/smashing. And thanks to Vanta for sponsoring Smashing Security.
Do your end users always, and I mean always without exception, work on company-owned devices and IT-approved apps? I didn't think so.
So my next question is, how do you keep your company's data safe when it's sitting on all those unmanaged apps and devices?
It ensures that every user credential is strong and protected, every device is known and healthy, and every app is visible.
Can you join us at our favorite part of the show, the part of the show that we like to call Pick of the Week?
Could be a funny story, a book they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. It doesn't have to be security-related necessarily.
I know we've been really positive this episode, but I'm gonna have to present you with a Nitpick of the Week.
It also tries to entertain people who do know how to play chess and are enthusiastic about chess.
But it's like they've taken Traitors, which is a fun TV programme, if you've ever seen Traitors.
So everyone's got a nickname.
Everyone's like, "Oh, I am the Destroyer, I am the Anarchist." And they're playing chess, and they are presented, these people playing this competition, as some of the best upcoming chess players in Britain.
It's like, "No, they're not." I'm not that good at chess, right?
Most of these guys are worse than me. I can tell. And I'm not that great. So it's not very entertaining.
I think it makes no sense at all if you can't play chess because you don't understand what's going on. It makes no sense at all if you do like chess.
The analysis is just terrible, even with the lovely Sue Perkins.
This is 40 years ago, and it was better than what they are putting on the TV now. It was more interesting, it was more entertaining.
It was presented by Bill Hartston, who was an International Master, and Jeremy James. You can find it on YouTube.
Go and check that out if you want to see how chess should be done on TV.
Or indeed go on YouTube where there are millions of amazing YouTube influencers now who are now playing chess. Chess apparently is a big thing now on the social media.
But this television programme, utterly unentertaining, and that is why it is my Nitpick of the Week.
I play cards a lot, and I much prefer playing cards in real life. But sometimes that's not possible. Maybe it's 4 a.m., right?
And you don't want to wake up your husband because he wouldn't appreciate being poked for a game of gin rummy. Exactly.
Maybe you're waiting for an appointment somewhere, or maybe you're commuting. And what do you do to fill those minutes other than wasting time on the socials?
So this week I'm choosing a cribbage app.
This app is called Cribbage Classic, created by Games by Post LLC. Who knows who they are? But this app seems to be a result of love of the game.
Because cribbage, or crib as we call it in the know, is a card game traditionally for two players, but you can play three or four.
And it involves playing and grouping cards in combinations to gain points all games. But it has several distinctive features because you have this gorgeous cribbage board, right?
A set of pinholes and pins used for scorekeeping. And you have a unique scoring system. So it's just a very cool game and it's not easy to pick up.
But once you get it, it's a treat of a game. And this app, Cribbage Classic, is great for beginners and pros. You can have a beginner game or a pro game.
It's just a nice, quiet card game for a bit of alone time.
So, Smashing Security listeners, we are speaking with not one, not one but two infosecurity gurus, Material.security.
This is the company that offers a unified detection and response platform for Google Workspace and Microsoft 365.
So we have Josh Donelson, who leads technology alliances, and we have Tony Albano, a seasoned AI ambassador with Google and Workspace security expert.
Welcome both to the show, gentlemen.
My career started as a hardware engineer, if you go back far enough, and then some time at VMware, and then a bunch of time at places like Okta.
Looking after identity and cybersecurity. Been here at Material for a couple of years now and really looking forward to the conversation today.
And being here at Google, wanted to take advantage of the opportunity to dive into AI and specifically how it works with the Google Workspace platform.
So it's great to be able to take advantage of all the things Google has to offer.
We know that it's a powerful tool, and we know that powerful tools can be used for good and bad. So how are you guys seeing AI show up in organizations today?
So you can look at things like automated email protection for massive amounts of spam, things of that nature.
And all of that has been integrated into these products for years and years.
And what we're seeing more and more of with the advent of large language models is the ability to now customize attacks, things like phishing campaigns, spam campaigns, et cetera, that are directly targeted to individuals or organizations, people are able to do that much faster, right?
You're able to iterate through these different campaigns at a much higher rate.
And what that means is now the tools of detection have to be able to update themselves at a much faster pace as well.
And you guys are talking millions, right?
So we have to leverage these foundational investments in things like AI and things like automated detection in order to make sure that our services are supercharged with that security presence as well.
So essentially what we're investing in is the frontline being the phalanx that any of these bad actors would have to get through.
If something were to happen, that's where human detection and that human intelligence can come into play as well.
So we still need to ensure that not just do we have best-in-class automated detection, automated protection across our entire platform of services.
But then how do we essentially put together some disparate actions or dots?
And there's a lot of tools built into Workspace that allow our administrators to be able to string together events, say, in the event of an internal issue.
But I think that's where Josh's team over at Material really comes into play as well.
When one attack shows some flavor of success, it becomes super easy to then have 1,000 tiny iterations on it.
The perspective here at Material is to really take a pragmatic approach to how we are using AI and really making sure we're doing what AI is really, really good at.
And what we've learned is AI is not a catch-all for detection. You can't just say, here's our large language model or here's a pre-trained set of models.
Please catch everything that's coming in the front door that Google doesn't already catch because the cost of a false positive is just too high. We can't block business.
We can't impact the user experience or the employee experience. We can't stop folks from collaborating or the business doesn't move forward.
What we're thinking about here at Material are things like AI is phenomenal at large-scale pattern matching, right? Have I ever seen anything this before?
Can I rapidly bring that metadata from a bunch of different platforms and put it right in front of a security analyst so that that human can much more quickly decide, real threat, false threat, triaging all of those messages.
If you think of the flow of a normal security analyst day, the vast majority of these things are caught by Google native platform services, 99.99%, I think, at one of the reports I read recently.
But the really novel ones maybe get through, or maybe there's one that's very specific to my business or one of my executives. If it gets reported, it needs to be triaged.
But if my security team has 37 other newsletters that they signed up for but they don't want to see anymore getting in the analyst's way, that becomes a problem that really has nothing to do with the type of threat itself, just an operations problem.
So at Material, we can take AI and say, those 3 are obviously newsletters, look at them later.
This one is obviously a threat, we're going to block it right away until you can get to it. And for these two in the middle, we think they're worth your eyeballs right now.
And that triage effort is really, really powerful in terms of operationalizing what are typically smaller teams.
If you're a large Fortune 500, you may have the capacity to write 1,000 detection rules in your own platform. But most of us need a little bit of help.
And that's a really, really pragmatic way to apply AI that doesn't take the human hand off the wheel, if you will.
So if there are sensitive documents, sensitive pieces of material that may be stored in the platform, how do we ensure that that user isn't able to overshare that material externally, whatever the case may be, right?
So this is another area where Google has invested in a lot of foundational AI that now we allow organizations to actually train their own models.
Maybe it's a patent, maybe it is, if you're in biotech research, maybe it's some sort of a genome or a protein or whatever the case may be where those traditional DLP engines fall flat.
Well, now by leveraging AI, we're able to train our own models based on the material that our organization considers sensitive, right?
So if we take the case of patents, if, let's say, we have 100 different patents that are just sitting out there, now we can point our detection engine at that and say, okay, I want you to train your model based on all of the patents that we've filed.
And now, because it works directly with our sensitivity system, now we can say this particular document is considered confidential, this one is eyes only, and then that flows through to say what can be shared externally and what cannot.
There are a number of different APIs inside of the Workspace ecosystem that you'd have to look at.
The training of some of those models to really use the label taxonomy to its fullest can take some time.
Got a number of customers that have come to us and said, we know we have to fix this, but job one is figuring out what we have.
And that's really hard because again, there's not extra people just sitting around looking for things to do.
So this operations model of pulling together all the incredible signal and the power of the native tools, the DLP rules based on labels, we've empowered the Material Platform to sort of help with that.
There's a bunch of AI behind the scenes that helps additional sensitive data discovery, and we're able to write back labels into Google Workspace to accelerate some of that work.
But at the core, it's giving the operations folks some help to make sure that they're able to take the most advantage of what Google has built. So that's the operation side.
I do want to take just a couple of seconds and talk about sort of AI specifically detecting things like ransomware, insider threat.
And if you think about what we're addressing here, right, it's a business that has centered their operations inside of Google Workspace, right? That's where the business runs from.
I've got strategy documents. Tony talked about patents. The amount of collaboration and back and forth before you submit a patent is through the roof.
If no one's ever done that, it's a wild project to take on. But all those drafts, they're going to end up in email.
And all those external partners, you're collaborating with a law firm, you're collaborating probably with outside expertise, you're collaborating with somebody that's going to help you package and file that and deal with the government.
Those are all external people. So if you think about what insider threat or account takeover looks like, it looks like a change in your communication pattern.
Detecting that is really hard because sending an external email is valid. Having a forwarding rule in my inbox is valid. Having that sensitive data in my inbox is valid.
The combination of all of those things is what signals something like insider threat.
And so because of where Material is connected, we can apply some of our backend AI, by the way, to the previous point, also humans.
To some of these detections and raise them directly to a security operations professional.
And so it's really an unlock for Workspace in a lot of ways, which is like, go forth, right? Go forth and prosper because the platform is going to catch the vast majority of it.
And this sort of novel— here's, here's that same theme again, right?
This novel or this unique or this change in previous behavior, Material is going to be able to get because we're connected directly into the inbox.
It's just a really, really wonderful partnership.
But before, before we wrap up, I'd love to know your thoughts on the smaller firms, because a lot of firms, a lot of security outfits out there focus on the big fish, the big organizations.
What are your views on that market segment?
Because it seems to me if nobody focuses seriously on these groups, like the startups that are working with AI at the frontier, they could be ducks sitting in a pond of infosecurity risk.
They are experiencing massive employee growth. They are certainly trying to operate in multiple regions, or maybe they've got a product that is the next viral thing.
And so they're getting hit on all sides with requests for collaboration and partnership.
These are the ones that have all the same kinds of business risk as a larger entity, but none of the team.
And so this idea of being able to, one, aggregate signals into, into a single place, whether you sort of orbit your SOC around the endpoint or if you orbit your SOC around the network or in our case, you know, we're sort of wanting you to orbit the SOC around Workspace because that's where business flows.
But you have to pick one. And then you want to think of your toolset as a thing that can help you establish baselines. What do I have? What's being used for? Who's using it?
Are they allowed to? And what are some of the access models correlating against what's normal and what's not normal?
Point is, something like Material can help with that aggregation and operations acceleration from a Workspace perspective, it's part of what we were designed to do and why we're such great partners.
SPEAKER_02. Hear, hear. You know, when you look at it from an executive standpoint, it's the question of where do we invest?
You know, my advice to some of those small businesses would be to, number one, understand what you have, what are you trying to protect? What does that data look like?
And work hand in hand with executive leadership to understand exactly where that growth is supposed to be taking place.
So that we can better understand the tools we have in our tool belt and deploy them in an effective manner.
The last thing that we want to do as security experts is impede the growth of an organization, impede the collaboration that is required to partner with other organizations because nobody grows in a silo, right?
So we need to ensure that we have that baseline understanding, we establish it, deploy it, and then we can look at optimizing and ensuring that we are leveraging whatever tools we have available to provide that defense in depth and the defense at scale that we need to do in order to be successful.
Check it out for free at material.security. That is material.security.
Josh Donelson of Material.security and Tony Albano of Google, thank you so much for sharing your expertise with us. SPEAKER_03. Absolutely. SPEAKER_02. Thank you for having me.
You can find Smashing Security on BlueSky, unlike Twitter, which wouldn't let us have a And don't forget to ensure you never miss another episode.
Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
It's their support that helps us give you this show for free. For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 411 episodes.
Check out SmashingSecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Episode links:
- The Trump Administration Accidentally Texted Me Its War Plans – The Atlantic.
- Here Are the Attack Plans That Trump’s Advisers Shared on Signal – The Atlantic.
- How the Atlantic’s Jeffrey Goldberg got added to the White House Signal group chat – The Guardian.
- From convenience to compromise: The rising threat of quishing scams – Fast Company.
- Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware – Hacker News.
- QR Code Statistics 2024: Trends & Use Cases – QR Code.
- Honey Garlic Scallop Kabobs – Heinz.
- With QR Code Redemption Set to Surge to 5.3 Billion in 2025, Cybercriminals will Increase Their Quishing Attacks – Wealth & Finance International.
- Chess Masters: The End Game – BBC iPlayer.
- Cribbage Classic – iOS app store.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Material – Email security that covers the full threat landscape – stopping new flavors of phishing and pretexting attacks in their tracks, while also protecting accounts and data from exploit or exposure.
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
- 1Password Extended Access Management – Secure every sign-in for every app on every device.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
