Elon Musk

Smashing Security podcast #184: Vanity Bitcoin wallets, BlueLeaks, and a Coronavirus app conspiracy

A conspiracy spreads on social media about Coronavirus tracing apps, US police find decades’ worth of sensitive data leaked online, and is there a Bitcoin bonanza to be had from watching Elon Musk YouTube videos?

All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by Graham Cluley and Carole Theriault, joined this week by the BBC’s Zoe Kleinman.

Smashing Security podcast #177: Elon Musk, Roblox, and Love Bug author found

What can X Æ A-12 Musk teach us about passwords? How did our guest finally hunt down in Manila the author of one of history’s biggest virus outbreaks? And what on earth is a hacker doing breaching Roblox security?

All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by technology journalist Geoff White.

Smashing Security podcast #175: Zoom deepfakes, Zardoz, and ‘Rona tracing

Will deepfake disguises hit a video conference near you, can Coronavirus-tracing apps be trusted, and should Facebook shut down anti-quarantine events?

All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.

Another wave of Elon Musk bitcoin scams spread by verified Twitter accounts

The cryptocurrency giveaway scammers are up to their tricks again on Twitter, and it seems that Twitter simply can’t keep up with them.

My advice to Twitter? Make Login Verification compulsory for verified accounts.

Smashing Security podcast #101: Rule 34, Twitter scams, and Facebook fails

A Facebook friend request leads to arrest, Twitter scams ride again via promoted ads, and adult websites expose their members. Oh, and Graham finds out what Rule 34 is.

All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.

Twitter thought Elon Musk’s bizarre tweets were evidence he’d been hacked

It’s an odd state of affairs when the bogus Elon Musk accounts offering bitcoin giveaways appear more legitimate than the real Elon’s tweets.

bitdefender.com

Here’s why Twitter will lock your account if you change your display name to Elon Musk

There’s bad news if your name really is “Elon Musk”.

You’re going to have to jump over some additional hurdles to convince Twitter that you should be allowed to change your display name to the one you share with the boss of Tesla and SpaceX.

Read more in my article on the Hot for Security blog.

Elon Musk retracts vile Twitter accusation against cave rescuer

Tesla chief Elon Musk retracts his unfounded allegations against man who helped boys escape from a Thai cave, but scammers are given another opportunity to strike.

Smashing Security podcast #086: Elon Musk submarine scams and 2FA bypass

Crypto scamming Thai cave scoundrels! $25 million to make anti-fake news videos! TimeHop data breach! Phone number port out scams!

All this and much much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by B J Mendelson.

Thai Cave rescue scammers pose as Elon Musk

Time and time again, crypto scammers are creating accounts in the names of known Twitter users and using devious tricks to fool their followers into believing they are reading a genuine message from the likes of Elon Musk.

Ex-Tesla employee sued for hacking and stealing company data

Tesla claims former employee has admitted writing software that hacked company systems, and leaked data to external third parties.

bitdefender.com

Tesla saboteur caused extensive damage and leaked highly sensitive data, claims Elon Musk

Tesla CEO Elon Musk believes that the company is the victim of deliberate sabotage perpetrated by an employee.

Read more in my article on the Hot for Security blog.