When Ubiquiti was hacked, the world thought it was a normal security breach, but the truth was even stranger. Are you happy you’re still using it? And why is the Apple Watch accused of crying.Wolves?

All this and much more is discussed in the latest edition of the “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined by Mark Stockley this week.

Also, don’t miss our featured interview with SecurEnvoy’s Chris Martin.

host:

Graham Cluley – @gcluley
Carol Terrio – @caroletheriault

The guests:

Mark Stockley – @Mark Stockley

Episode link:

Sponsored by:

  • Bit Warden – The Bitwarden vault is end-to-end encrypted with zero-knowledge encryption, including the website URL where you have an account. For a more secure password manager, move to Bitwarden.
  • node layer – NordLayer protects corporate networks, protects remote workers and business data. It also helps ensure security compliance. First month free.
  • Secure Envoy – With increasing cybersecurity threats, everyone in your organization needs authentication tailored to their specific access needs and role risk profile. Check out our free guide to SecurEnvoy today.

Support the show:

You can help the podcast by telling your friends and colleagues about “Smashing Security” and leaving a review. Apple podcasts again pod chaser.

Become a supporter via Patreon again Apple podcasts Enjoy ad-free episodes and early release feeds!

follow us:

Follow the show on Twitter. @SmashinSecurityor on Mastodon, Smashing Security Subredditagain Visit our website for more episodes.

thank you:

Theme Song: “Vinyl Memories” by Mikael Manvelyan.
Various sound effects: AudioBlocks.

Did you find this article interesting? Follow Graham Cluley on Twitter again Mastodon To read more about the exclusive content we post.


Graham Cluley is a veteran of the antivirus industry and has worked for many security companies since the early 1990s when he created the first version of Dr. Solomon’s Antivirus Toolkit for Windows. He is now an independent security he is an analyst and makes regular media appearances and lectures internationally on the topics of computer he security, hackers and online he privacy. Follow him on Twitter. @gcluleyfor Mastodon @[email protected]or drop him an email.

cropped-BTA_Logo-B-1-scaled-1
YOUR FUTURE STARTS HERE.

BLUE TRAINING ACADEMY

Register now for our membership to gain access to our elite training program and fast forward your career today!

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

cropped-BTA_Logo-B-1-scaled-1
Security Blog

Blue Training Academy

Blue Training Academy was developed in 2018 as a educational and training facility for continuing education and certification courses. Blue Training Academy is an educational institution that allows for all sectors of the public and Criminal Justice field to gain ongoing training and education.

Copyright ©️ All rights reserved. | Blue Training Academy Blog