Smashing Security cover image

Smashing Security

Latest episodes

undefined
10 snips
Jul 16, 2025 • 37min

Choo Choo Choose to ignore the vulnerability

Discover how a teenager hilariously hacked into Poland's tram system with a cheap remote. Dive into the daunting responsibilities of managing freight train safety and the unexpected behavior of Grok, an AI chatbot, raising ethical questions around AI accountability. The hosts tackle email security essentials, emphasizing SPF and DMARC, while sharing their favorite comedy picks and exploring the value of streaming services. With a mix of tech insights and light-hearted banter, this discussion is both informative and entertaining!
undefined
14 snips
Jul 9, 2025 • 35min

Call of Duty: From pew-pew to pwned

Dive into the dark side of gaming as serious security flaws in Call of Duty: WWII are unveiled. Discover how hackers have hijacked PCs during online matches, prompting urgent action from platforms like Game Pass. The discussion shifts to scams targeting families of recently incarcerated individuals, where fraudsters impersonate bail bondsmen. Learn about the emotional toll of navigating bail systems, the intricacies of securing release, and vital tips for protecting oneself from cybersecurity threats in an increasingly complex digital landscape.
undefined
20 snips
Jul 2, 2025 • 34min

Surveillance, spyware, and self-driving snafus

A Mexican drug cartel is using traffic cameras and spyware to track the FBI, raising urgent questions about surveillance technology's impact. The hosts also dive into the uneven progress of self-driving cars, with Tesla's ambitious robotaxis facing real-world challenges. Amidst these serious topics, they chat about how to survive heatwaves with innovative gadgets and explore the architectural charm of Leighton House, revealing its hidden gems. Prepare for a mix of intrigue, humor, and thought-provoking insights!
undefined
50 snips
Jun 25, 2025 • 55min

Operation Endgame, deepfakes, and dead slugs

Joe Tidy, BBC cyber correspondent and author of "Ctrl-Alt-Chaos", dives into the intriguing world of teenage hackers and ransomware gangs. He discusses the stylish police initiative, Operation Endgame, aimed at dismantling cybercrime with creative strategies. The conversation also touches on the growing threat of deepfakes in hiring processes, and how a perfect LinkedIn profile could mask a North Korean hacker. Plus, there are amusing anecdotes about competitive pond husbandry and the quirky board game Hitster!
undefined
18 snips
Jun 18, 2025 • 32min

The curious case of the code copier

A GCHQ intern faces dire consequences after taking secrets home, showcasing the importance of cybersecurity. An Australian hacker's audacious exploits lead to an unexpected escape from legal trouble, only for him to face deportation. The hosts weave in humor through stories of flow states and engaging anecdotes, including a comedic reflection on a pet owl. With discussions around the ethics of hacking and the lessons learned from historical breaches, this lively conversation is both entertaining and thought-provoking.
undefined
26 snips
Jun 11, 2025 • 36min

Toothpick flirts, Google leaks, and ICE ICE scammers

Exploring the oddities of nightlife, the hosts hilariously recount sticky memories from a chaotic discotheque. They dive into a shocking Google vulnerability that exposes user data and highlight the rise of dangerous scams targeting immigrants using fear tactics. There's also a light-hearted take on navigating historical films, mixed with essential safety tips like the Dutch Reach technique for opening car doors. Expect a blend of tech talk, social commentary, and plenty of laughs.
undefined
10 snips
Jun 4, 2025 • 34min

Fake Susies, flawed systems, and fruity fixes for anxiety

A comedic yet concerning exploration of political impersonation sees a digital clone of Trump's aide causing chaos among Republicans. The hosts dissect the absurdity of mental health advice on TikTok, such as eating an orange in the shower — a suggestion that's more fragrant than effective. They also reminisce about simpler tech support days through a humorous story involving a CRT monitor and an unexpected shade of brown. Dive into the intersection of cybersecurity and mental health with a blend of humor and thoughtful discussion!
undefined
18 snips
May 28, 2025 • 48min

Star Wars, the CIA, and a WhatsApp malware mirage

Allan Liska, a Ransomware Sommelier known for his expertise in cybersecurity, joins the hosts for an engaging discussion. They explore a bizarre incident where a Star Wars fan site now redirects to the CIA. Cambodia's rise as a hotspot for scam call centers is examined, linking organized crime to economic impacts reminiscent of half the country’s GDP. They also debunk the myth of WhatsApp malware, offering vital tips to safeguard against its vulnerabilities and highlighting the importance of verifying security alerts.
undefined
29 snips
May 21, 2025 • 48min

Grid failures, Instagram scams, and Legal Aid leaks

This week, technology expert Dinah Davis joins the conversation, sharing her experience with her daughter’s hacked Instagram account and how parental controls unexpectedly came to the rescue. The discussion dives into a massive blackout in Spain and Portugal, pondering everything from cyberattacks to playful theories about aliens. Dinah and the hosts also tackle the alarming UK legal aid hack, emphasizing the dire need for enhanced cybersecurity measures to protect vulnerable communities. A whirlwind of intriguing insights awaits!
undefined
22 snips
May 14, 2025 • 51min

Hello, Pervert! - Sextortion scams and Discord disasters

Join Matt Hillary, CISO at Drata and GRC expert, as he unpacks the disturbing rise of sextortion scams and the alarming hijacking of Ledger's Discord by phishers seeking cryptocurrency access. He shares insights on emotional vulnerabilities in such scams and provides practical advice for victims. The discussion also emphasizes the significance of governance, risk management, and compliance in building trust and navigating the complexities of modern security threats. Discover how proactive strategies in GRC can safeguard against evolving cyber risks!

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app