376 episodes

We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!

Got questions/suggestions/stories to share?
Email: tips@sophos.com
Twitter: @NakedSecurity
Instagram: @NakedSecurity

Naked Securit‪y‬ Sophos

    • Technology
    • 4.7 • 54 Ratings

We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!

Got questions/suggestions/stories to share?
Email: tips@sophos.com
Twitter: @NakedSecurity
Instagram: @NakedSecurity

    S3 Ep21: Cryptomining clampdown, the 100-ton man, and ScamClub ads

    S3 Ep21: Cryptomining clampdown, the 100-ton man, and ScamClub ads

    The graphics card that wants you to stick to playing games, the man that didn't weigh 100 tons after all, and the marketing gang that used a browser bug to bombard iPhone users with scammy online surveys.



    With Kimberly Truong, Doug Aamoth and Paul Ducklin



    Original music by Edith Mudge



    Got questions/suggestions/stories to share?

    Email tips@sophos.com

    Twitter @NakedSecurity

    Instagram @NakedSecurity

    • 45 min
    S3 Ep20: Corporate megahacking, true love gone bad, and tax grabs

    S3 Ep20: Corporate megahacking, true love gone bad, and tax grabs

    How a bug hunter snuck into the internal networks of 35 megacorporations. Why romance scams are going stronger than ever (and how to avoid them). What to do about those tempting but treacherous "tax refund" messages. And a listener tells us how he got a bit carried away while he was gardening...



    With Kimberly Truong, Doug Aamoth and Paul Ducklin



    Original music by Edith Mudge



    Got questions/suggestions/stories to share?

    Email tips@sophos.com

    Twitter @NakedSecurity

    Instagram @NakedSecurity

    • 53 min
    S3 Ep19.5: How NOT to be a bug bounty hunter

    S3 Ep19.5: How NOT to be a bug bounty hunter

    In this special mini-episode, Paul Ducklin talks to Sophos cybersecurity expert Chester Wisniewski about bug bounty hunting.



    How does bug bounty hunting work? What should you do if you get a bug report that doesn't follow established protocol? Chester tells you how to deal with so-called "beg bounties", where self-styled "experts" beg you for money or even threaten you with ill-defined "problems" they claim to have found.



    https://news.sophos.com/en-us/have-a-domain-name-beg-bounty-hunters-may-be-on-their-way



    https://nakedsecurity.sophos.com/beware-of-technical-experts-bombarding-you-with-bug-reports



    Original music by Edith Mudge



    Got questions/suggestions/stories to share?

    Email tips@sophos.com

    Twitter @NakedSecurity

    Instagram @NakedSecurity

    • 16 min
    S3 Ep19: Chrome zero-day, coffee hacking and Perl.com stolen

    S3 Ep19: Chrome zero-day, coffee hacking and Perl.com stolen

    We delve into Google's tight-lipped Chrome bugfix, explain how a Belgian researcher awarded himself 111,848 cups of coffee, and discuss the audacious but thankfully temporary theft of the Perl.com domain.



    With Kimberly Truong, Doug Aamoth and Paul Ducklin



    Original music by Edith Mudge



    Got questions/suggestions/stories to share?

    Email tips@sophos.com

    Twitter @NakedSecurity

    Instagram @NakedSecurity

    • 47 min
    S3 Ep18: Apple emergency, crypto blunder and botnet takedown

    S3 Ep18: Apple emergency, crypto blunder and botnet takedown

    Apple pushed out an iOS update in a hurry to shut down a serious 0-day bug. The GnuPG team scrambled to fix an ironic vulnerability that could be exploited during the very process of checking if the data you just received could be trusted. And Europol reported on a successful takedown operation against the notorious Emotet malware.



    With Kimberly Truong, Doug Aamoth and Paul Ducklin



    Original music by Edith Mudge



    Got questions/suggestions/stories to share?

    Email tips@sophos.com

    Twitter @NakedSecurity

    Instagram @NakedSecurity

    • 43 min
    S3 Ep17: Facemasks, hidden ads and paranormal hacking

    S3 Ep17: Facemasks, hidden ads and paranormal hacking

    What's the connection between coronavirus facemasks and fingerprint biometrics? Who would have expected funky job ads on the White House website? And what would you do if you ran into a deceased former colleague on your network?

    With Kimberly Truong, Doug Aamoth and Paul Ducklin

    Original music by Edith Mudge

    ***

    Got questions/suggestions/stories to share?

    Email tips@sophos.com

    Twitter @NakedSecurity

    Instagram @NakedSecurity

    • 47 min

Customer Reviews

4.7 out of 5
54 Ratings

54 Ratings

Sm@rt speller ,

5 Star Review

Love the show. Actually can be done in less than 30 seconds.

Craig_S_92 ,

Informative and Fun

I’ve subscribed to many IT and security podcasts and find many too long and dry to keep me engaged. The Naked Security podcast content has always been on point and the hosts are always entertaining. It’s one of the few I listen to as soon as it’s published.

TheFinalWolf ,

Good Security (and general) Podcast

This is a fun podcast to keep tabs on some interesting security news.

I do have a request though: I would love to hear much more from Doug and Kim.
I’m not trying to be mean, but Paul seems to sort of take over too much. I enjoy various facts and technical jargon, but I’ve found myself muttering ‘let them speak’ much too often.

Top Podcasts In Technology

Listeners Also Subscribed To