Smashing Security #017: Data breaches, zero day exploits, and toenail clippings

Graham Cluley

Smashing Security #017: Data breaches, zero day exploits, and toenail clippings

Smashing Security #017: Data breaches, zero day exploits, and toenail clippings

Hotel malware has been stealing guests’ payment card details… again, should businesses relay delay rolling out vulnerability patches, and Burger King’s Whopper TV ad campaign tries to take advantage of viewers’ Google Home devices with predictable results.

All this and more is discussed in the latest edition of the “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest Paul Ducklin.

Show notes:

Listen on Apple Podcasts | Google Podcasts | Other... | RSS
More episodes...

Sponsor: Recorded Future

This episode of Smashing Security is made possible by the generous support of Recorded Future – the real-time threat intelligence company whose patented machine learning technology continuously analyzes technical, open, and dark web sources to give organizations unmatched insight into emerging threats.

Sign up for free daily threat intelligence updates at recordedfuture.com/intel.

Thanks to Recorded Future for their support.

Hope you enjoy the show, and tell us what you think. You can follow the Smashing Security team at @SmashinSecurity on Twitter.

Remember: Subscribe on iTunes to catch all of the episodes as they go live. Thanks for listening!

Graham Cluley Graham Cluley is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s when he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows. Now an independent security analyst, he regularly makes media appearances and is an international public speaker on the topic of computer security, hackers, and online privacy. Follow him on Twitter at @gcluley, or drop him an email.

2 Replies to “Smashing Security #017: Data breaches, zero day exploits, and toenail clippings”

  1. More on this story:

    http://www.usatoday.com/story/tech/news/2017/04/19/intercontinental-hotels-group-breach-holiday-inn-crowne-plaza-front-desk-malware/100652570/

    One thing you didn't mention Graham was that if you use Apple Pay it generates a unique card number per transaction so even if a retailer's system is compromised then you're safe. Obviously this can't be used for deposits but it can be used for everything else.

    Another option is to get a pre-paid card such as:

    https://uk.virginmoney.com/virgin/prepaid-card/

    Of course the "nth-complexity infinite binary loop" is a "meaningless term"

    https://en.wikipedia.org/wiki/Goodtimes_virus
    https://www.sophos.com/ko-kr/press-office/press-releases/1999/11/va_hoaxes.aspx

  2. Also:

    http://www.theverge.com/circuitbreaker/2017/4/20/15364960/google-home-speaker-multi-user-new-feature

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.