Smashing Security #083: Fake email derails clarinetist's dream PODCAST

Smashing Security #083: Fake email derails clarinetist’s dream

Hell hath no fury like a jealous clarinetist’s girlfriend! Your Google ChromeCast could be letting stalkers find out where you live! And why on earth is Graham recommending people write their passwords down in a book!?

Learn more in the latest episode of the award-winning “Smashing Security” podcast, with hosts Graham Cluley and Carole Theriault.

12 Common Threat Intelligence Use Cases SPONSOR

12 Common Threat Intelligence Use Cases

Many thanks to the great folks at Recorded Future, who have sponsored my writing for the last week.

Recorded Future provides the only complete threat intelligence solution powered by patented machine learning to help security teams defend against cyberattacks.

Are you using threat intelligence to its full potential?

The term “threat intelligence” is often misunderstood and with so many security options out there, organizations struggle to find the right solution to meet their needs. The Gartner “Market Guide for Security Threat Intelligence Products and Services” explains the different use cases and how to best leverage threat intelligence in your organization.

You will learn how to:

  • Identify 12 common threat intelligence use cases.
  • Align these use cases to your specific requirements.
  • Implement strategies for getting value from threat intelligence.
  • Evaluate vendors based on your business needs.

Download this report to get clarity on threat intelligence definitions and learn how to make the right decisions for your organization today.

If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Apple confirms it's closing security loophole that police were using to crack iPhones

Apple confirms it’s closing security loophole that police were using to crack iPhones

Yes, Apple is toughening up the security of iPhones with iOS 12. Yes, the steps Apple is taking will make it harder for law enforcement agencies to thwart iPhone security. But no, that’s not the reason Apple is doing it.

Read more in my article on the Tripwire State of Security blog.

Ss episode 82 thumb PODCAST

Smashing Security #082: World Cup cybersecurity, crypto crashes, and a bang of a password fail

Coinrail cryptocurrency exchange goes offline after hack, Russia appears to be ‘live testing’ cyber attacks, and Florida stopped running background checks on gun buyers because of forgotten password.

All this and much much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by football-mad John Leyden from The Register.