Podcast Episodes

Back to Search
Whopper Hackers, and AI Whoppers

Whopper Hackers, and AI Whoppers


Episode 434


Ever wondered what would happen if Burger King left the keys to the kingdom lying around for anyone to use? Ethical hackers did - and uncovered drive-thru recordings, hard-coded passwords, and even t…


Published on 13 hours ago

How hackers turned AI into their new henchman

How hackers turned AI into their new henchman


Episode 433


Your AI reads the small print, and that's a problem. This week in episode 433 of "Smashing Security" we dig into LegalPwn - malicious instructions tucked into code comments and disclaimers that sweet…


Published on 1 week ago

Oops! I auto-filled my password into a cookie banner

Oops! I auto-filled my password into a cookie banner


Episode 432


We unpack how some password managers can be tricked into coughing up your secrets, with a clickjacking sleight-of-hand, what website owners can do to prevent it, and how to lock down your personal pa…


Published on 2 weeks ago

How to mine millions without paying the bill

How to mine millions without paying the bill


Episode 431


In episode 431 of the "Smashing Security" podcast, a self-proclaimed crypto-influencer calling himself CP3O thought he had found a shortcut to riches — by racking up millions in unpaid cloud bills.


Me…


Published on 3 weeks ago

Poisoned Calendar invites, ChatGPT, and Bromide

Poisoned Calendar invites, ChatGPT, and Bromide


Episode 430


A poisoned Google Calendar invite that can hijack your smart home, a man is hospitalised after ChatGPT told him to season his food with… pesticide, and some thoughts on Superman’s latest cinematic ou…


Published on 4 weeks ago

Replit panics, and the AI that will kill you

Replit panics, and the AI that will kill you


Episode 429


Those of you who tuned in to last week's episode (#428) will have heard the big news from my podcast pal Carole that she's decided to move on from her co-hosting duties on the show.

There have been so…


Published on 1 month ago

Red flags, leaked chats, and a final farewell

Red flags, leaked chats, and a final farewell


Episode 428


The viral women-only dating safety app Tea, built to flag red flags, gets flagged itself - after leaking over 70,000 private images and chat logs. We are talking full-on selfies, ID docs, private DMs…


Published on 1 month, 1 week ago

When 2G attacks, and a romantic road trip goes wrong

When 2G attacks, and a romantic road trip goes wrong


Episode 427


In this episode, Graham warns why it is high time we said goodbye to 2G - the outdated mobile network being exploited by cybercriminals with suitcase-sized SMS blasters. From New Zealand to London, s…


Published on 1 month, 2 weeks ago

Choo Choo Choose to ignore the vulnerability

Choo Choo Choose to ignore the vulnerability


Episode 426


In episode 426 of the "Smashing Security" podcast, Graham reveals how you can hijack a train’s brakes from 150 miles away using kit cheaper than a second-hand PlayStation.

Meanwhile, Carole investiga…


Published on 1 month, 3 weeks ago

Call of Duty: From pew-pew to pwned

Call of Duty: From pew-pew to pwned


Episode 425


In episode 425 of "Smashing Security", Graham reveals how "Call of Duty: WWII" has been weaponised - allowing hackers to hijack your entire PC during online matches, thanks to ancient code and Micros…


Published on 2 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate