Latest episode – listen now!
Want to know more about this topic or about us? Contact us!
Latest episode – listen now!
by Paul Ducklin [00’38”] Learning from computer virus history. [02’26”] The PrintNightmare saga continues. [05’27”] Apple puts out a patch, but doesn’t say why. [08’12”] Snitch on a crook and earn $10 million. [17’50”] Scammars do grammer and speeling correctly. [25’12”] And the Business Email Compromise that wasn’t. With Doug Aamoth and Paul Ducklin. Intro and outro music by Edith Mudge. . . . Read more
by Paul Ducklin [01’32”] We explain how a format string bug could lock your iPhone out of your own network. [08’53”] We revisit the PrintNightmare saga, which is sort-of fixed but not really. [12’50”] We look back at the 20-year-old Code Red virus. [18’30”] We look at what cybercriminals spend money on (hint: more cybercrime). [29’10”] And in this . . . Read more
by Paul Ducklin [00’21”] The “Independence Day Weekend” ransomware drama. [15’55”] The PrintNightmare nightmare continues. [24’16”] An email hacker gets his conviction overturned. [30’35”] In this week’s Oh! No! story, a server room fills with toxic fumes… With Doug Aamoth and Paul Ducklin. Download the IBM 3270 retrofont that Duck admired in the podcast. Intro and outro . . . Read more
by Paul Ducklin [05’06”] Ukrainian cops bring out the BFG (Big Fearsome Grinder) and cut open some doors. [10’23”] A repeated request for destructive Linux code enters its 15th year. [19’39”] Peloton exercise bicycles found to be rootable. [28’43”] What’s the point of paying ransomware money? [33’53”] Oh! No! of the week With Kimberly Truong, Doug Aamoth and . . . Read more
by Paul Ducklin [03’22”] Will quantum cryptography mean the end of encryption? [10’30”] How was the FBI able to get bitcoins back in the Colonial Pipeline ransomware case? [25’00”] What is the ALPACA attack, and does it make your browsing less secure? [25’00”] Oh! No! of the week. With Kimberly Truong, Doug Aamoth . . . Read more
by Paul Ducklin We investigate whether AirDrop is really as dangerous as researchers claimed. We discuss the pestiferous problem of fake Linux bugs submitted as an academic exercise. We review the latest Sophos Ransomware Report and uncover uncomfortable truths about paying up. With Kimberly Truong, Doug Aamoth and Paul Ducklin. . . . Read more
by Paul Ducklin One of the hot new jargon terms in cybersecurity is supply chain attack. The phrase itself isn’t new, of course, because the idea of attacking someone indirectly by attacking someone they get their supplies from, or by attacking one of their supplier’s suppliers, and so on, is . . . Read more
by Paul Ducklin We investigate the controversy that was stirred up recently when the FBI in the US used malware to fight malware. The Feds accessed remote access webshells left behind after the recent Hafnium attacks to remove the webshells themselves, after a court order said they could. As helpful . . . Read more
by Paul Ducklin Remember Rowhammer? Well, it’s back, and this time it’s called SMASH. Rowhammering is a reliability problem that besets many computer memory chips, notably including the sort of RAM in your laptop or mobile phone. Simply put, rowhammering means that if you read the same memory adddresses over . . . Read more