Cyber sloppiness, and why does Google really want to hide your IP address?
Description
Ahoy! There's trouble in the South China Seas as Filipino organisations fail to secure their systems, we take a close look at Google IP protection, and we take a look at just how so much genetic profile data leaked out of 23andMe.
All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Mark Stockley.
Warning: This podcast may contain nuts, adult themes, and rude language.
Episode links:
- Philippines’ cybersecurity failures exposed as hackers leak state secrets, people’s data - South China Morning Post.
- IT admins are just as culpable for weak password use - Outpost24.
- Google Chrome wants to hide your IP address - MalwareBytes.
- The 23andMe data breach reveals the vulnerabilities of our interconnected data - The Conversation.
- 23andMe User Data Stolen in Targeted Attack on Ashkenazi Jews - Wired.
- Worried about the 23andMe hack? Here's what you can do - Washington Post.
- Paris Police 1905 - BBC iPlayer.
- British Hen Welfare Trust.
- Art Musings - Art Musings podcast.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. It’s Device Trust for Okta. Watch the demo today!
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get 10% off!
SUPPORT THE SHOW:
Tell your friends and colleagues about “Smashing Security”, and leave us a review on Apple Podcasts or Podchaser.
Become a supporter via Patreon or Apple Podcasts for ad-free episodes and our early-release feed!
FOLLOW US:
Follow us on Twitter at @SmashinSecurity, or Mastodon, or on the Smashing Security subreddit, and visit our website for more episodes.
THANKS:
Theme tune: "Vinyl Memories" by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
This podcast uses the following third-party services for analysis:
OP3 - https://op3.dev/privacy