Never knock on the door of a nuclear submarine base and ask for a selfie

Never knock on the door of a nuclear submarine base and ask for a selfie

A disgruntled data analyst decides that the best response to losing his contract is to steal the entire company payroll database and demand $2.5 million in Bitcoin - signing his extortion emails from a company called "Loot."

Meanwhile, two people drive up to the entrance of the UK's nuclear submarine base at Faslane and politely ask if they can have a look around. Tourists? Spies? Something in between?

Plus: Female Muslim punk rock group, and a little red book that might save your sanity in a post-truth world.

All this and more in episode 460 of the "Smashing Security" podcast with cybersecurity veteran Graham Cluley, and special guest Jenny Radcliffe.


EPISODE LINKS:




SPONSORS:

  • ThreatLocker - Start your free trial and book a demo of ThreatLocker today to see how you can implement Zero Trust in your environment.
  • Vanta - Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
  • Meter - Network infrastructure for the enterprise. Get a free personalised demo.


SUPPORT THE SHOW:

Tell your friends and colleagues about “Smashing Security”, and leave us a review on Apple Podcasts or Podchaser.

Become a supporter! Join Smashing Security PLUS via Patreon or Apple Podcasts for ad-free episodes on our early-release feed!


FOLLOW THE SHOW:

Follow us on Bluesky or Mastodon, or on the Smashing Security subreddit, and visit our website for more episodes.


THANKS:

Theme tune: "Vinyl Memories" by Mikael Manvelyan.

Assorted sound effects: AudioBlocks.



Privacy & Opt-Out: https://redcircle.com/privacy

Episoder(463)

The Epstein Files didn’t hide this hacker very well

The Epstein Files didn’t hide this hacker very well

Supposedly redacted Jeffrey Epstein files can still reveal exactly who they’re talking about - especially when AI, LinkedIn, and a few biographical breadcrumbs do the heavy lifting.Sloppy redaction le...

5 Feb 36min

The dark web's worst assassins, and Pegasus in the dock

The dark web's worst assassins, and Pegasus in the dock

In episode 452, a London-based YouTuber wins a landmark court case against Saudi Arabia after his phone was hacked with Pegasus spyware — exposing how a single, seemingly harmless text message can tur...

29 Jan 45min

I hacked the government, and your headphones are next

I hacked the government, and your headphones are next

In episode 451 of "Smashing Security," we meet the cybercriminal who hacked the US Supreme Court, Veterans Affairs, and more - and then helpfully posted screenshots (and even someone’s blood type) on ...

22 Jan 45min

From Instagram panic to Grok gone wild

From Instagram panic to Grok gone wild

Confusion reigns after claims that data linked to 17.5 million Instagram accounts is up for sale - sparked by a vague post, contradictory statements, and a flood of password reset emails nobody asked ...

15 Jan 36min

How to scam someone in seven days

How to scam someone in seven days

Romance scammers have apparently discovered astrology... and Taurus is their secret weapon.In episode 449 of "Smashing Security", we take a look inside an actual romance-fraud handbook - complete with...

8 Jan 1h 1min

The Kindle that got pwned

The Kindle that got pwned

Think your Kindle is harmless? Think again! In this episode, Graham and special guest Danny Palmer unpack a Black Hat Europe talk revealing how a boobytrapped audiobook could exploit the Amazon eBook ...

18 Des 202536min

Grok the stalker, the Louvre heist, and Microsoft 365 mayhem

Grok the stalker, the Louvre heist, and Microsoft 365 mayhem

On this week's show we learn that AI really can be a stalker’s best friend, as we explore a strange tale that starts with a manatee-shaped mailbox on a millionaire's lawn and ends with Grok happily do...

11 Des 202555min

A hacker doxxes himself, and social engineering-as-a-service

A hacker doxxes himself, and social engineering-as-a-service

A teenage cybercriminal posts a smug screenshot to mock a sextortion scammer... and accidentally hands over the keys to his real-world identity. Meanwhile, we look into the crystal ball for 2026 and c...

4 Des 202544min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
aftenpodden-usa
popradet
lydartikler-fra-aftenposten
forklart
stopp-verden
rss-gukild-johaug
dine-penger-pengeradet
det-store-bildet
rss-ness
nokon-ma-ga
hanna-de-heldige
fotballpodden-2
aftenbla-bla
rss-penger-polser-og-politikk
rss-utenrikskomiteen-med-bogen-og-grasvik
rss-dannet-uten-piano
e24-podden
bt-dokumentar-2