Smashing Security podcast #435: Lights! Camera! Hacktion!

Industry veterans, chatting about computer security and online privacy.

Graham Cluley
Graham Cluley
@

 @grahamcluley.com
 / grahamcluley

Smashing Security podcast #435: Lights! Camera! Hacktion!

When “bad actors” stop being hackers and start being… actual actors.

This week, Graham and special guest Jenny Radcliffe play “Hacker or Ham?” (yes, Steven Seagal, we’re looking at you), before diving into a campaign which saw an Iranian gang luring Israeli performers with fake casting calls for a serious film. We unpack why positive lures can short-circuit scepticism just as effectively as fear.

Plus, the UK’s ICO says students are increasingly hacking their own schools.

Meanwhile, Graham heads to 1960s Oxford with Endeavour, while Jenny investigates the Wirral’s mysterious “Catman”.

All this, and more, in episode 435 of the “Smashing Security” podcast.

Podcast artwork
Smashing Security #435

Lights! Camera! Hacktion!

0:00
0:00 0:00
0:00
Show full transcript
TranscriptThis transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Graham Cluley

I'm going to give you the name of somebody, and you have to tell me whether they've ever portrayed a hacker, cybercriminal, general computer baddie on screen, or if they're just what we in the business call a bit rubbish at acting. Hacker or ham?

Jenny Radcliffe

Okay, let's do it.

Unknown

Smashing Security, Episode 435. Lights, camera, action with Graham Cluley. Hello, hello, and welcome to Smashing Security, Episode 435. My name's Graham Cluley.

Jenny Radcliffe

And I'm Jenny Radcliffe.

Graham Cluley

Jenny, welcome back to the show. It's been such a long time.

Jenny Radcliffe

I know, it feels ages. It's lovely to be back. Thanks for asking me.

Graham Cluley

It is yonks. Now, for anybody who doesn't know you, Jenny, and shame on them if that is the case. How would you describe yourself? Well, I suppose my handle online for all the socials is The People Hacker. And that comes from me being known as a social engineer specialising in psychology of social engineering scams and cons.

Graham Cluley

You're also a celebrated keynote speaker as well, aren't you? People will often have seen you at conferences and running awareness courses inside companies as well, sort of raising the spectre of social engineering and really helping people get to grips with it.

Jenny Radcliffe

Yeah, lots of time on the road, lots of talks, podcasts, interviews, that type of thing. And a book. I wrote a book.

Graham Cluley

Yes.

Jenny Radcliffe

Which a lot of people seem to enjoy, which is very nice. A few don't, I did have one great review where the guy hated it, hated everything about it. I was a terrible writer. It was awful. And I looked to see what else he'd reviewed, and he'd bought some kitchen utensils, which he'd absolutely spent really a very long time telling everyone how terrible they were. So I didn't feel quite as bad. Let me get the plug in. The book is called People Hacker. 99p very often on a Kindle, I've noticed.

Graham Cluley

Fantastic. Well, before we kick off, let's thank this week's wonderful sponsors, Adaptive Security and Vanta.

Jenny Radcliffe

I'd talk about the ICO report that warns that kids are hacking their schools for fun or days.

Graham Cluley

We'll be hearing more about them later on the show. This week on Smashing Security, we're not going to be talking about Shayhalud, a fast-spreading open-source worm that is stealing credentials from developers and publishing their secrets on GitHub. You'll hear no discussion of how losses are rocketing at Jaguar Land Rover as a cyberattack continues to cause disruption. And we won't even mention how North Korean spies are using ChatGPT to create fake South Korean military IDs. So Jenny, what are you going to be talking about this week?

Graham Cluley

And I'm going to be talking about crimes against cinema. All this and much more coming up on this episode of Smashing Security. Now, chums, chums, I have to say, I absolutely loathe it when people use the term "bad actors" to describe hackers and cybercriminals. How do you feel about it, Jenny?

Jenny Radcliffe

It just— I find— well, I find it confuses people. It confuses audiences if I say bad actor, they laugh.

Graham Cluley

They think of Nicolas Cage. That's what they're thinking about.

Jenny Radcliffe

You see, I don't think Nicolas Cage is that bad.

Graham Cluley

Don't you?

Jenny Radcliffe

No, because I remember a movie called Wild at Heart, which was a David Lynch film, and he was great in it. Oh, okay. I don't know if he was acting so much.

Graham Cluley

As being Nicolas Cage.

Jenny Radcliffe

Correct. So I'll give you that.

Graham Cluley

Okay, bad actor has become this terrible bit of corporate jargon, and it makes cybercriminals sound like they're trying to remember the lines in their Am Dram production of Hamlet, or that they're about as impressive as I was when I played a tree in my school's nativity play. And there are a lot of actors, thespians, who are out of work, and many of them, I suspect, are out of work for good reason. And I think there could be a danger that we create a self-fulfilling prophecy if we refer to malicious hackers as bad actors. Are we, in fact, increasing the risk that actual bad, straight-to-DVD-style actors will view their natural career progression as, well, let's become cybercriminal? So I don't like the terminology. And that is why I propose we start the fight back. Right now, right here on the podcast. I think it's important to stop using the phrase bad actors and be able to tell the difference between bad actors and bad actors. So what I'm going to do with you today, Jenny, is I'm going to play a little game with you, which I call Hacker or Ham. Hacker or Ham.

Jenny Radcliffe

Okay, let's do it. Let's do it. So, Hacker or Ham is the game show where cybersecurity meets questionable acting choices. Mm-hmm.

Graham Cluley

And you have to tell me whether they've ever portrayed a hacker, cybercriminal, general computer baddie on screen, or if they're just what we in the business call a bit rubbish at acting. How well do you know your movies?

Jenny Radcliffe

Okay, I'm okay.

Graham Cluley

You're alright. I'm not a big movie buff. Although, do you know, back in the day— Yeah.

Graham Cluley

Yes, the good old days. The good old days. We'll all watch a movie together, right?

Graham Cluley

All right.

Jenny Radcliffe

And what we do is we all have to press go at a certain time and then we'd comment online. And it was, you know, clunky and a little bit disjointed, but oh, innocent times, Graham. And it wasn't really all that long ago, I suppose.

Graham Cluley

I'm a little bit embarrassed, because there's a number of cyber-related movies I've never seen. So, I've never seen Hackers. I've never seen Sneakers.

Jenny Radcliffe

Oh, great.

Graham Cluley

I've never seen Jurassic Park. I've never seen WarGames.

Jenny Radcliffe

Sneakers! Sneakers is the one for me.

Graham Cluley

Is Sneakers good? Well, it's social engineering. Right. Alright. Let's play Hacker or Ham. Hacker.

Jenny Radcliffe

Mhm.

Graham Cluley

Or ham. So, Jen, I am going to read out the name of an actor. You're gonna tell me if they are a bad actor, or if they have played a hacker on celluloid. Are you ready?

Jenny Radcliffe

I'm ready. Let's do it. Number 1. Angelina Jolie. So, ham played Acid Burn, was the name in Hackers. Or alternatively, Angelina Jolie, Kate.

Graham Cluley

Oh.

Jenny Radcliffe

So, she's an actor that played a hacker.

Graham Cluley

And would she say good actor? Or a ham?

Jenny Radcliffe

I'm sure she doesn't care what we think. But I think Angelina Jolie is responsible for lots of people of our generation raising an eyebrow and paying more attention to hackers generally, in that movie. For sure.

Graham Cluley

I think that these celebrity actors right now, when they hear that we've been playing Hacker or Ham, they're probably playing Podcaster or Poop. They're probably saying, is this a decent podcast or is this a pile of cack?

Jenny Radcliffe

I can tell you one thing about Angelina Jolie is that I was very good friends with someone who used to be a bodyguard.

Graham Cluley

Oh?

Jenny Radcliffe

Especially when she was an ambassador for the UN.

Graham Cluley

Okay.

Jenny Radcliffe

Apparently, bit of a nightmare to look after, but there you go. That's all I've got to say about that.

Graham Cluley

Hack on. Or ham. Alright, round 2 of Hacker or Ham. Well done, I think you did very well there. Hayden Christensen, hacker or ham?

Jenny Radcliffe

He played Anakin Skywalker.

Graham Cluley

He did.

Jenny Radcliffe

I don't know if hacking was a particular feature of Star Wars, but I knew

Graham Cluley

Yeah, I mean, he's pretty— I would say he's pretty hammy. If you saw him in Attack of the Clones, it was— Dear, oh dear, it wasn't good, was it?

Jenny Radcliffe

Well, you know, I'm afraid I didn't. So there you go.

Graham Cluley

Alright, number 3, Steven Seagal. Hacker or ham?

Jenny Radcliffe

Ham. Pure ham. Pure ham. And Seagal though, interesting fact, a lot of people think he did play a hacker.

Graham Cluley

Right.

Jenny Radcliffe

Do you want me to tell you why? And you're going to love this. This is so you.

Graham Cluley

Oh, go ahead, yes.

Jenny Radcliffe

Because in the movie Under Siege 2, which I will leave people to give an opinion on. But however, people assume he was a hacker because he used an Apple Newton in that. I don't know whether because of the timing or early '90s or something, that was considered wow, he must be a hacker.

Graham Cluley

That would be really cool.

Jenny Radcliffe

He must be a hacker because he's using a personal digital assistant. So there you go.

Graham Cluley

Yeah, as far as I've been able to find out, he's never actually played a hacker. Definitely a bad actor, I would say. Okay, Nicolas Cage. Well, we've already mentioned him. Hacker or ham? You've got quite strong opinions on Nicolas Cage.

Jenny Radcliffe

I don't know if he's ever played a hacker, I have

Graham Cluley

I don't think he has played a hacker.

Jenny Radcliffe

Who's Kevin Mitnick? So no, Kevin Mitnick, obviously for most people in security would know Kevin Mitnick was the hacker known for social engineering and blended attacks.

Graham Cluley

Yes.

Jenny Radcliffe

And also the person who said a quote that I use when I do my talks, which is, "You can't download a patch for human stupidity." And I always say that made him really popular at parties, coming up with stuff that. Whether you agree with him or not.

Jenny Radcliffe

you'd get something sci-fi in. to be honest.

Graham Cluley

Kevin Mitnick, hacker or ham?

Graham Cluley

And I think Kevin Mitnick has actually acted. I think he was in some TV shows.

Jenny Radcliffe

Yeah.

Graham Cluley

Was he in Alias or something that? He had a good agent, I expect.

Jenny Radcliffe

He did. Walk-on parts, I think.

Graham Cluley

Yes, yes. Hugh Jackman, hacker or ham?

Jenny Radcliffe

An actor, but he was in a film called Swordfish.

Graham Cluley

Yes.

Jenny Radcliffe

Where he did play a hacker who had to hack something at gunpoint, I think, if I recall.

Graham Cluley

While being distracted by Halle Berry.

Jenny Radcliffe

And the thing is, the thing I always think about that, or I mean, it's years since I've seen it, but how fast he types.

Graham Cluley

Well, he would.

Jenny Radcliffe

I learned to type very quickly. And I'm looking at him doing a count. This is just almost no one types that quick. Well, thank you very much, Jenny, for playing Hacker or Ham. Hacker or Ham. I have to be honest, the thing that actually caught my attention, that is virtual reality adult entertainment.

Graham Cluley

Well, someone's got to do the motion capture for it, Jenny, you know.

Jenny Radcliffe

I always thought that would be the main use of that, but anyway, we digress. Yes, I mean, obviously, even the thought of even one of those things makes me, as a social engineer, chill. It is, it is chilling, isn't it? Because what you've done in this particular case is you've handed over your entire identity, pretty much, to Iranian state-sponsored hackers. Are we really thinking professional actors would be more sceptical? Suspicious. No one's suspicious enough.

Graham Cluley

Oh, that's true. That's true. No one's suspicious enough, are they? Graham, you are piling in on actors here. People always say, oh God, you know, do we need to be paranoid? Yes. Now, in this particular case, it wasn't teenage script kiddies having a bit of a poke at out-of-work actors. This was actually a sophisticated social engineering operation. Whenever I hear things like this, it reminds me of you, because I always remember you talking about the way that hacks in the past had sort of better names and skulls and things. That was something that made me laugh when you spoke about that. Yes.

Jenny Radcliffe

I hate when people say how sophisticated or not something is.

Graham Cluley

Right. Because if it gets through, it doesn't need to be sophisticated. I mean, what do people say when it's not sophisticated? He sort of played cameos.

Graham Cluley

Yeah, I think that's a fair

Jenny Radcliffe

Yes. And it's basically they just had the gift of the gab, didn't they? Where they were able to fool people into making poor decisions or they tricked them into believing that they were employees who'd been locked out of accounts. But then, you will see that when security writers and researchers say, they say, "It wasn't particularly sophisticated." Well, forget that. Well, Charming Kitten, earlier this year, they were targeting Israeli technology experts, journalists, and gamers. Cybersecurity professionals as tension rose between Israel and Iran. For instance, the hackers were reportedly using AI to help generate more convincing phishing messages, and apparently these messages said there is an urgent need for immediate assistance on an AI-based threat detection system to counter a surge in cyberattacks targeting Israel. Ah, but using AI to write the scripts, come on, come on now, more effort.

Graham Cluley

Everyone's so lazy these days.

Jenny Radcliffe

Yes, exactly. You know, put some work into it, why don't you? So hackers aren't just going after the usual suspects here. They're going after actors, they're going after journalists, they're going after academics, and they don't need a zero-day exploit or sophisticated malware. Just good old-fashioned social engineering will often unlock the door. It's an interesting one, though, because I've been banging on about emotional triggers for years. But actually, this is quite rare inasmuch as a lot of the time when emotion's used in social engineering attacks, it's a negative one. So it's fear or it's shame or it's anger.

Graham Cluley

Or your credit card's been debited. Right. Or, you know, we've either got your emails and we've found something dodgy. So in this particular case, the actual bad actors, weren't the ones who couldn't remember the lines or deliver dialogue convincingly. They were the ones who were delivering these phishing emails so convincingly that professional actors who can normally tell when someone's putting on a performance, they were the ones who got taken in.

Jenny Radcliffe

Yeah.

Graham Cluley

It said, I don't have enough information to determine if a human life is more valuable than a sentient robot's. Pull the plug. In the absence of clear information, I would default to inaction.

Jenny Radcliffe

Abort. Abort. It's going to save the robot. It's begun. Machines that learn, they grow and strive. One day my name's Graham Cluley. And I'm Mark Stockley. And we'd like you to tune into our podcast, The AI Fix, your weekly dive headfirst into the bizarre and sometimes mind-boggling world of artificial intelligence. So I wanted to talk a little bit about this Information Commissioner's Office. This report because they've issued a warning.

Graham Cluley

Yes.

Jenny Radcliffe

I saw an article from Joe Tidy on the BBC and this article that says there is a worrying trend of students hacking their own school and college systems for fun or as part of a dare. And it was basically saying that over half, so 57% of cyber attacks and data breaches in an education setting, that was carried out by someone with access to internal systems was with the students.

Graham Cluley

Right. Now that does mean that 43% is not carried out by students, but it's worrying people who are paid to worry about this. And there was this lady, Heather Toomey, who's the principal cyber specialist at the ICO, says, "What starts out as a dare, a challenge, a bit of fun in a school setting can ultimately lead to children taking part in damaging attacks on organisations or critical infrastructure." Right.

Jenny Radcliffe

But almost a third of the breaches involve— I'm not laughing because this is bad, but I'm laughing because obviously this is going to happen— involve students illegally logging on to staff computer systems by guessing passwords or stealing details from their teachers. And in one instance, Graham, a 7-year-old— What?

Graham Cluley

A 7-year-old?

Jenny Radcliffe

A 7-year-old was involved in a data breach and subsequently referred to the National Crime Agency's Cyber Choices programme, which I have to admit, to my shame, I had not heard of before. But it did feel very— I don't know whether it's just the world we're living in, but that sounds quite 1984. Anyway, and it's to help them understand the seriousness of their actions.

Graham Cluley

I think I might know what Cyber Choices is. I think it's actually quite a good initiative. I think it's something—

Jenny Radcliffe

I'm sure it is.

Graham Cluley

It's targeted to young people and it's designed to make them understand the repercussions. So they sort of say, we know you're into video games, we know you want to get one over your mates in the games, because that often has been a gateway into eventually hacking and cybercrime.

Graham Cluley

point. I mean, we've seen these attacks recently, a number of well-known named organizations where it appears some of them being hacked because people have rung up the help desks.

Jenny Radcliffe

Of course.

Graham Cluley

People begin with DDoS attacks and things.

Jenny Radcliffe

Yeah, of course, it's a good thing to have that.

Graham Cluley

But a 7-year-old?

Jenny Radcliffe

But you know, this pulls into what happens to me, is that I am often asked to either speak to groups of youngsters, kids and teenagers, and sometimes a little bit older, about making the right choices in terms of their cyber skills and this type of thing as well. But the first thing I wanted to talk to you about was, I feel this is part of the problem comes from the curriculum and the way that cyber computing and stuff is taught in schools, because I think it can be quite boring. I don't know whether it's taught in an exciting way.

Graham Cluley

Right.

Jenny Radcliffe

And I think if we don't teach kids on a curriculum about all the facets of this, they're going to be educated by someone else and they're going to find out on themselves.

Graham Cluley

Yeah.

Jenny Radcliffe

I just don't think it starts early enough. I don't think they teach kids how exciting careers in cyber can be.

Graham Cluley

Right.

Jenny Radcliffe

And I think from the very beginning, it needs to be taught that this is the bad stuff. This is what can happen out there. You know, if you've got a kid or a teenager who's really good at it, who's enthused and passionate about it, I think the curriculum needs to focus on that. And really teach them as much as we possibly can. They're going to learn it anyway.

Graham Cluley

Yes. But also maybe help them in terms of cyber ethics, because they may be immature in terms of their understanding of acceptable behaviours. For instance, hopefully most people know you shouldn't go around reading other people's diaries, right? And just because it's easy maybe to hack into someone's email because they chose a predictable password, doesn't mean it's all right to go in there and read everything which is in there.

Jenny Radcliffe

No.

Graham Cluley

And, or you see people who sort of hack each other's social media accounts and post messages, you know, as a laugh, you know, in that person's name to embarrass them in front of their friends. And again, it sounds like a practical joke, but it's actually quite a hurtful thing to do. And it feels like those sort of things are the beginning elements of what could become something which turns more malicious in the future.

Jenny Radcliffe

Yeah.

Graham Cluley

If you think that's all right, then you begin to use that as a basis for maybe deciding other behaviours are acceptable.

Jenny Radcliffe

It should be from day one. Kids should be taught about the skills required, the ethics required, but also that it can be exciting and you can be on the right side. Yes. And also, I feel sorry for teachers.

Graham Cluley

Yeah.

Jenny Radcliffe

I mean, I was asked to look at something for a school and the IT guy was great.

Graham Cluley

Yeah.

Jenny Radcliffe

But I mean, trying to do the job that if it'd been a company with that many people and that many potential access points, he probably would have had a team of 8 to 10 minimum. But there's one guy and he's trying to keep an eye on all of this. But what made me smile was the idea that people were surprised.

Graham Cluley

Yeah.

Jenny Radcliffe

You know, they were surprised when most of us who've got children have had at least one instant in their life where the child has managed to sort out a technical issue for you. Or maybe I'm just speaking for myself or someone I know.

Graham Cluley

Back in our day, we were programming the video recorder. Now the kids are probably fixing the firewall at home.

Jenny Radcliffe

Exactly. And what it brings me to as well is the idea that alongside all of this, there should be being taught about awareness. And that gets forgotten as well. So, kids are naturally brilliant social engineers, right? They know which emotional strings to pull. They know what stories to tell. They know how to use urgency. So, we have to get a grip on the curriculum and we have to start teaching our children and our teenagers, "Look, you've got this, kids. These are the pitfalls. These are the dangers. These are the ethics. This is how you protect yourselves." And look, it can be exciting to be on the right side. And that, that to me, that's the wake-up call. Wise words. Okay, chums, hands up if you've ever clicked a dodgy link and then immediately thought, oh no, I've just handed my entire life over to a bloke in a tracksuit somewhere. Don't worry, you're not alone. Pick of the Week. Pick of the Week is the part of the show where everyone chooses something they like. Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish. It doesn't have to be security related necessarily. Well, no. No.

Graham Cluley

A simple answer.

Jenny Radcliffe

Because I'm afraid—

Graham Cluley

Yes?

Jenny Radcliffe

I don't watch that much television, which is a problem in the current stage of my various projects, but I don't actually watch all that much TV. So, but I love a detective drama, so do tell. Yeah, I don't watch that much either, but I get to see it sometimes over her shoulder. And Endeavour is a prequel to Inspector Morse. Lovely. Da da da!

Graham Cluley

Jenny, what's your pick of the week?

Jenny Radcliffe

Okay, so let's go to the opposite end of the scale.

Graham Cluley

Okay.

Jenny Radcliffe

It's a mystery as well.

Graham Cluley

Yes.

Jenny Radcliffe

So I'll read the headline.

Graham Cluley

Right. And this is from the Liverpool Echo. Crowds armed with torches hunt the Catman every night. Okay. Yep.

Jenny Radcliffe

Who is dressed head to toe in a black catsuit. And this starts at sort of mid-June or mid-July.

Graham Cluley

All right. And people start seeing this guy dressed as a cat crawling through sand dunes, hiding behind bus stops, and in one instance approaching a parked car. And obviously now you would, you'd think there would be something more sinister or dodgy about this, but it appears to be not the case. Can I just clarify, when you say a cat suit, do you mean he's dressed up like a cat? Has he got whiskers and a tail, or?

Jenny Radcliffe

It appears to be just someone wearing a skin-tight suit and some sort of cat mask.

Graham Cluley

Right. People have sort of looked at photographs and seen him in the background, and someone's taken a shot of him, and you can look them up online, obviously. I can't really make out that it looks like a cat, but apparently, he meows as well. Yes. Whereas now there's people taking photographs, they're being interviewed, there's a Facebook group. And it sort of made me laugh, even though clearly, you know, nothing bad has happened so far. Oh, so he wasn't his team. Now, a thought strikes me, Jenny, with all this attention this is getting on social media, is there a danger, I hate to say this, of copycats? Except when we're not, Graham. This is the thing, except when we're not. Oh, you can't go around dressing up as a clown. Someone dressed up as the clown and walked in front of people's Ring doorbells for a while and did it in places like Newcastle and Liverpool and Glasgow. The thing that I suppose I'd finish on on this would be, when I talk about social engineering and hacking generally, I talk about motive a lot, right? Or in this case, a sexual kink. Yes, carry on, yes.

Jenny Radcliffe

Well, I've avoided saying that, Graham, and now you've gone there, haven't you? I think it's a gimp suit. There's some meeting, he hasn't got the address for the party, he's going down the road. Your filthy mind went straight to the gutter. It doesn't seem to be that.

Graham Cluley

You're calling me the pervert, but this was your pick of the week. Can I just point that out?

Jenny Radcliffe

So it was, with no indication whatsoever that it has anything to do with anything else. Brilliant stuff. Well, that just about wraps up the show for this week. If you find me on LinkedIn or look for The People Hacker across socials, you'll find articles and interviews and things like that. And then need to watch this space for next year because next year is going to be very busy.

Graham Cluley

And of course, Smashing Security is on social media as well. You can find Smashing Security on Bluesky and you can also follow me on LinkedIn. And don't forget to ensure you never miss another episode, follow Smashing Security in your favorite podcast app. Such as Apple Podcasts, Spotify, and Pocket Casts. For episode show notes, sponsorship info, guest lists, and the entire back catalog of 435 or so episodes, check out smashingsecurity.com. Until next time, cheerio, bye-bye.

Jenny Radcliffe

Bye.

Graham Cluley

You've been listening to Smashing Security with me, Graham Cluley, and that was rather fun, wasn't it? Thank you so much to Jenny Radcliffe. And also I'm grateful to this episode's sponsors, Adaptive Security Inventor. And of course, to all the chums who've signed up for Smashing Security Plus over on Patreon. They include Sebi, Heisenberg, Jack Anver Perth, Davon Pam, Xylar, Matthew Hunt, Mark Norman, Snack Madge, Daniel Kromeck, Nigel Scott, Sammy Dozer, Thom Langford, John W, Dr Herbalist, Mark Luxton, Reuben, Richard Maltner, and Steve B. Well, if you're rather jealous of those fine chaps and chapesses, you may well want to get your name read out at the end of one of the Smashing Security episodes, and you can have that pleasure from time to time. It's just one of the joys of Smashing Security Plus. You sign up for as little as $5 a month and you can get your name read out every now and then, as well as get early access to Smashing Security episodes and the occasional bonus content. If you're interested, just go to smashingsecurity.com/plus for more details. Now, I realize not everybody can do that. Not everybody can afford it and you've probably got much better things to spend your money on. So there are other ways in which you can support the podcast. You can like, you can subscribe, you can give 5-star reviews. Apparently that really tickles the algorithms and boy oh boy, people do love having their algorithms tickled, don't they? Maybe you can jot down a few lines and post on social media enticing other people to give Smashing Security a listen. Whatever you do to spread the word I really, really appreciate it. It is enormously helpful and it really makes all the effort worthwhile. So hope you enjoyed this week's episode and that you'll tune in next week for some more. And until then, cheerio. Bye-bye.

Host:

Graham Cluley:

Guest:

Jenny Radcliffe

Episode links:

Sponsored by:

  • Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
  • Adaptive Security – request a custom demo featuring a real CEO deepfake simulation today from adaptivesecurity.com.

Support the show:

You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.

Become a Patreon supporter for ad-free episodes and our early-release feed!

Follow us:

Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.

Thanks:

Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.


Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and hosts the popular "Smashing Security" podcast. Follow him on TikTok, LinkedIn, Bluesky and Mastodon, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.