Coinbase crypto heists, QR codes, and ransomware in the classroom
Smashing Security5 Helmi 2025

Coinbase crypto heists, QR codes, and ransomware in the classroom

In episode 403 of "Smashing Security" we dive into the mystery of $65 million vanishing from Coinbase users faster than J-Lo slipped into Graham's DMs, Geoff gives a poor grade for PowerSchool's security, and Carole takes a curious look at QR codes.

All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by The Lazarus Heist's Geoff White.

Warning: This podcast may contain nuts, adult themes, and rude language.

Episode links:



Sponsored by:

  • Tailscale – Tailscale is perfect for work or personal projects, making networking simple. Its free plan covers up to 100 devices and 3 users. Get started at tailscale.com and be up and running in less than 10 minutes!
  • 1Password – Secure every app, device, and identity – even the unmanaged ones at 1password.com/smashing.
  • Cortex Symphony 2025 - Ready to transform your cybersecurity? Register now to see the future of security innovation with exclusive insights, demos, and stories from pros.


SUPPORT THE SHOW:

Tell your friends and colleagues about “Smashing Security”, and leave us a review on Apple Podcasts or Podchaser.

Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!


FOLLOW US:

Follow us on Bluesky or Mastodon, or on the Smashing Security subreddit, and visit our website for more episodes.


THANKS:

Theme tune: "Vinyl Memories" by Mikael Manvelyan.

Assorted sound effects: AudioBlocks.

Privacy & Opt-Out: https://redcircle.com/privacy

Jaksot(463)

Replit panics, and the AI that will kill you

Replit panics, and the AI that will kill you

Those of you who tuned in to last week's episode (#428) will have heard the big news from my podcast pal Carole that she's decided to move on from her co-hosting duties on the show.There have been som...

6 Elo 202527min

Red flags, leaked chats, and a final farewell

Red flags, leaked chats, and a final farewell

The viral women-only dating safety app Tea, built to flag red flags, gets flagged itself - after leaking over 70,000 private images and chat logs. We are talking full-on selfies, ID docs, private DMs,...

30 Heinä 202540min

When 2G attacks, and a romantic road trip goes wrong

When 2G attacks, and a romantic road trip goes wrong

In this episode, Graham warns why it is high time we said goodbye to 2G - the outdated mobile network being exploited by cybercriminals with suitcase-sized SMS blasters. From New Zealand to London, sc...

23 Heinä 202533min

Choo Choo Choose to ignore the vulnerability

Choo Choo Choose to ignore the vulnerability

In episode 426 of the "Smashing Security" podcast, Graham reveals how you can hijack a train’s brakes from 150 miles away using kit cheaper than a second-hand PlayStation. Meanwhile, Carole investigat...

16 Heinä 202536min

Call of Duty: From pew-pew to pwned

Call of Duty: From pew-pew to pwned

In episode 425 of "Smashing Security", Graham reveals how "Call of Duty: WWII" has been weaponised - allowing hackers to hijack your entire PC during online matches, thanks to ancient code and Microso...

9 Heinä 202535min

Surveillance, spyware, and self-driving snafus

Surveillance, spyware, and self-driving snafus

A Mexican drug cartel spies on the FBI using traffic cameras and spyware — because "ubiquitous technical surveillance” is no longer just for dystopian thrillers. Graham digs into a chilling new US Jus...

2 Heinä 202534min

Operation Endgame, deepfakes, and dead slugs

Operation Endgame, deepfakes, and dead slugs

In this episode, Graham unravels Operation Endgame - the surprisingly stylish police crackdown that is seizing botnets, mocking malware authors with anime videos, and taunting cybercriminals via Teleg...

25 Kesä 202554min

The curious case of the code copier

The curious case of the code copier

A GCHQ intern forgets the golden rule of spy school — don’t take the secrets home with you — and finds himself swapping Cheltenham for a cell. Meanwhile, an Australian hacker flies too close to the su...

18 Kesä 202532min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
ootsa-kuullut-tasta-2
rss-ootsa-kuullut-tasta
tervo-halme
rss-podme-livebox
rss-asiastudio
otetaan-yhdet
rss-vaalirankkurit-podcast
rss-raha-talous-ja-politiikka
the-ulkopolitist
et-sa-noin-voi-sanoo-esittaa
aihe
linda-maria
rss-sinivalkoinen-islam
rss-polikulaari-pitka-kiekko-ja-muut-ts-podcastit
rss-hyvaa-huomenta-bryssel
rss-girls-finish-f1rst
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset