Skip to content

How many cryptographers does it take to change a light bulb? – Naked Security

In this comprehensive article, the Naked Security podcast discusses various tech-related topics, with Doug Aamoth and Paul Ducklin providing their insights and opinions. The article begins with a humorous exchange between Doug and Paul about their representation of an interrogation mark. They then move on to discuss Miss Manners, an advice columnist who addressed the… 

What if you type in your password during a meeting? – Naked Security

Rewrite: In this episode of the Naked Security podcast, hosts Doug Aamoth and Paul Ducklin cover a range of topics, including crocodilian cryptocrime, the BWAIN streak, and the importance of touch-typing. They kick off the episode with a discussion on Tech History, highlighting IBM’s presentation of the Automatic Sequence Controlled Calculator (Mark I) to Harvard… 

Tell us about that breach! (If you want to.) – Naked Security

DOUG.  Firefox updates, another Bug With An Impressive Name, and the SEC demands disclosure. All that, and more, on the Naked Security podcast. [MUSICAL MODEM] Welcome to the podcast, everybody. I am Doug Aamoth; he is Paul Ducklin. Paul, I hope you will be proud of me… I know you are a cycling enthusiast. I rode… 

Bugs With Impressive Names! – Naked Security

Apple recently released a full update that includes not only the second Rapid Response patch but also a fix for another zero-day vulnerability. The zero-day in WebKit, which was previously addressed in the Rapid Response patch, has now been accompanied by a fix for a kernel-level vulnerability. Interestingly, the zero-day in WebKit was attributed to… 

When threat hunting goes down a rabbit hole – Naked Security

Why does your Mac’s calendar app say it’s JUL 17? Well, it turns out that on July 17, 2002, Apple launched its “iCal” calendar software, which revolutionized calendar management with features like internet-based calendar sharing and the ability to manage multiple calendars. The app’s icon prominently displayed “JUL 17,” which eventually led to the establishment… 

Supercookie surveillance shenanigans – Naked Security

In this comprehensive article, we will discuss a variety of topics, including the slide rule, Patch Tuesday, supercookie surveillance shenanigans, bugs arriving in pairs, Apple’s rapid patch, and the dangers of User-Agent. The article begins with a nostalgic look at the slide rule, a mathematical calculation tool that became obsolete with the advent of computers… 

Putting the X in X-Ops – Naked Security

The concept of “Ops” teams has evolved over time, starting with DevOps, then moving to SecOps, and finally to DevSecOps. In a recent podcast episode on Naked Security, Paul Ducklin interviews Matt Holdcroft, a cybersecurity expert at Sophos, about the importance of getting these teams to work together and prioritize cybersecurity. Holdcroft’s journey in the… 

What was Steve Jobs’s first job? – Naked Security

DOUG.  …it also involved a multitude of other cybercrimes. This individual, a 22-year-old from the UK, was involved in SIM swapping attacks, where he would manipulate mobile phone carriers to transfer victims’ phone numbers to his control. With access to their phone numbers, he would then take over their online accounts, including social media, email, and… 

So you think you know ransomware? – Naked Security

The Naked Security podcast, hosted by Doug Aamoth and Paul Ducklin, covers a range of topics related to cybersecurity and technology news. In a recent episode, the hosts discussed router vulnerabilities, Megaupload’s legal troubles, and Sophos’ new documentary series on ransomware. Router vulnerabilities can allow hackers to break into networks if not patched in time,…