Security News
![S3 Ep33: Eufy camera leak, Afterburner crisis, and AirTags (again) [Podcast]](/static/build/img/news/s3-ep33-eufy-camera-leak-afterburner-crisis-and-airtags-again-podcast-small.jpg)
We look into an unnerving case of mixed-up video feeds. We warn you against "Going rogue" when you can't get the download you want from the regular place.
![S3 Ep32: AirTag jailbreak, Dell vulns, and a never-ending scam [Podcast]](/static/build/img/news/s3-ep32-airtag-jailbreak-dell-vulns-and-a-never-ending-scam-podcast-small.jpg)
Apple's brand new AirTag product got hacked already. Why Dell patched a bunch of driver bugs going back more than a decade.
![S3 Ep31: Apple zero-days, Flubot scammers and PHP supply chain bug [Podcast]](/static/build/img/news/s3-ep31-apple-zero-days-flubot-scammers-and-php-supply-chain-bug-podcast-small.jpg)
We look into Apple's recent emergency updates that closed off four in-the-wild browser bugs. We explain how the infamous "Flubot" home delivery scam works and how to stop it.
![S3 Ep30: AirDrop worries, Linux pests and ransomware truths [Podcast]](/static/build/img/news/s3-ep30-airdrop-worries-linux-pests-and-ransomware-truths-podcast-small.jpg)
We investigate whether AirDrop is really as dangerous as researchers claimed. We discuss the pestiferous problem of fake Linux bugs submitted as an academic exercise.
![S3 Ep29: Anti-tracking, rowhammer problems and IoT vulns [Podcast]](/static/build/img/news/s3-ep29-anti-tracking-rowhammer-problems-and-iot-vulns-podcast-small.jpg)
How Firefox showed the hand to a widely abused online tracking trick. Why reading from one part of your computer's memory can paradoxically let you write to another part.
![S3 Ep28.5: Hacking back – is attack an acceptable form of defence? [Podcast]](/static/build/img/news/s3-ep28-5-hacking-back-is-attack-an-acceptable-form-of-defence-podcast-small.jpg)
Sophos cybersecurity expert Chester Wisniewski provides excellent, topical and timely commentary on the FBI's recent use of a malware-like method to forcibly clean up hundreds of servers still infected in the Hafnium aftermath. LISTEN NOW. Click-and-drag on the soundwaves below to skip to any point in the podcast.
![S3 Ep28: Pwn2Own hacks, dark web hitmen and COVID-19 privacy [Podcast]](/static/build/img/news/s3-ep28-pwn2own-hacks-dark-web-hitmen-and-covid-19-privacy-podcast-small.jpg)
![S3 Ep27: Census scammers, beg bounties and data breach fines [Podcast]](/static/build/img/news/s3-ep27-census-scammers-beg-bounties-and-data-breach-fines-podcast-small.jpg)
How scammers copied a government website almost to perfection. What to do about those fake "Bug" hunters who ask for payment for finding "Vulnerabilities" that aren't.
![S3 Ep26: Apple 0-day, crypto vulnerabilities and PHP backdoor [Podcast]](/static/build/img/news/s3-ep26-apple-0-day-crypto-vulnerabilities-and-php-backdoor-podcast-small.jpg)
Why Apple had to rush out a security update for iDevices. Two cryptographic security holes patched in OpenSSL. How PHP nearly got backdoored by crooks.
![S3 Ep25: Drained accounts, ransomware attacks and Linux badware [Podcast]](/static/build/img/news/s3-ep25-drained-accounts-ransomware-attacks-and-linux-badware-podcast-small.jpg)
How a social engineer ripped off a victim lured in by one of those "Small outstanding fee to pay" home delivery scams. The ransomware crooks targeting networks that still haven't done their Hafnium patches.