
452 episodes

Naked Security Sophos
-
- Technology
-
-
4.8 • 56 Ratings
-
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
Got questions/suggestions/stories to share?
Email: tips@sophos.com
Twitter: @NakedSecurity
Instagram: @NakedSecurity
-
S3 Ep90: Chrome 0-day again, True Cybercrime, and a 2FA bypass
Chrome quashes another zero-day browser bug. Two big-time cybercrime stories. A 2FA phishing scam that arrived PDQ. Chester swarmed by bots on Twitter.
Original music by Edith Mudge
Got questions/suggestions/stories to share?
Email tips@sophos.com
Twitter @NakedSecurity
Instagram @NakedSecurity -
S3 Ep89: Sextortion, blockchain blunder, and an OpenSSL bugfix
Memories of the iPhone 1. Sextortion scams target LGBTQ+ daters. Yet another blockchain blunder. OpenSSL fixes the bug missed in the last bugfix. And what became of Little Bobby Tables?
Original music by Edith Mudge
Got questions/suggestions/stories to share?
Email tips@sophos.com
Twitter @NakedSecurity
Instagram @NakedSecurity -
S3 Ep88: Phone scammers, hacking bust, and data breach fines
Duck gets behind the Ducks. 2000 phone scammers arrested in Interpol action. A three-year-old hacking case ends in conviction. And a Canadian financial company picks up an enormous data breach fine.
Original music by Edith Mudge
Got questions/suggestions/stories to share?
Email tips@sophos.com
Twitter @NakedSecurity
Instagram @NakedSecurity -
S3 Ep87: Follina, AirTags, ID theft and the Law of Big Numbers
Computer Science in the 1800s. Fixing Follina. AirTag stalking. ID theft site seizure. And the Law of Big Numbers versus SMS scams.
Original music by Edith Mudge
Got questions/suggestions/stories to share?
Email tips@sophos.com
Twitter @NakedSecurity
Instagram @NakedSecurity -
S3 Ep86: The crooks were in our network for HOW long?!
The dawn of the x86 era. The Active Adversary Playbook. A sort-of zero day in Windows. A real-life zero-day in Atlassian Confluence. And the registry settings that could keep you in your job.
Original music by Edith Mudge
Got questions/suggestions/stories to share?
Email tips@sophos.com
Twitter @NakedSecurity
Instagram @NakedSecurity -
S3 Ep85: Now THAT'S what I call a Microsoft Office exploit!
Why calling a computer after a famous scientist doesn't always help. The wacky but dangerous 0-day hole in Windows. Supply chain attacks and the crooks who orchestrate them. Smishing revisited. And why saying what you really mean makes you better at cybersecurity.
Original music by Edith Mudge
Got questions/suggestions/stories to share?
Email tips@sophos.com
Twitter @NakedSecurity
Instagram @NakedSecurity
Customer Reviews
5 Star Review
Love the show. Actually can be done in less than 30 seconds.
Informative and Fun
I’ve subscribed to many IT and security podcasts and find many too long and dry to keep me engaged. The Naked Security podcast content has always been on point and the hosts are always entertaining. It’s one of the few I listen to as soon as it’s published.
Good Security (and general) Podcast
This is a fun podcast to keep tabs on some interesting security news.
I do have a request though: I would love to hear much more from Doug and Kim.
I’m not trying to be mean, but Paul seems to sort of take over too much. I enjoy various facts and technical jargon, but I’ve found myself muttering ‘let them speak’ much too often.