Artwork

Content provided by Graham Cluley & Carole Theriault, Graham Cluley, and Carole Theriault. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Graham Cluley & Carole Theriault, Graham Cluley, and Carole Theriault or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

069: Cryptomining, China, and Bob Ross

42:11
 
Share
 

Manage episode 200762720 series 1708763
Content provided by Graham Cluley & Carole Theriault, Graham Cluley, and Carole Theriault. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Graham Cluley & Carole Theriault, Graham Cluley, and Carole Theriault or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

How come Apple's Mac App Store authorised a buggy app that mined for cryptocurrency in the background? How can a Mosquito attack steal data from an air-gapped computer? And is China keeping score on its social media-loving citizens?

All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest John Hawes.

Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.

Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!

Warning: This podcast may contain nuts, adult themes, and rude language.

Special Guest: John Hawes.

Sponsored By:


Support Smashing Security

Links:


  continue reading

377 episodes

Artwork

069: Cryptomining, China, and Bob Ross

Smashing Security

1,001 subscribers

published

iconShare
 
Manage episode 200762720 series 1708763
Content provided by Graham Cluley & Carole Theriault, Graham Cluley, and Carole Theriault. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Graham Cluley & Carole Theriault, Graham Cluley, and Carole Theriault or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

How come Apple's Mac App Store authorised a buggy app that mined for cryptocurrency in the background? How can a Mosquito attack steal data from an air-gapped computer? And is China keeping score on its social media-loving citizens?

All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest John Hawes.

Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.

Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!

Warning: This podcast may contain nuts, adult themes, and rude language.

Special Guest: John Hawes.

Sponsored By:


Support Smashing Security

Links:


  continue reading

377 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide