HP’s hold music, and human trafficking • Graham Cluley

Date:

Share post:

Journey with us to Myanmar’s shadowy scam factories, where trafficked workers are forced to run romance-baiting and fake tech support scams, and find out why a company’s mandatory hold time for tech support could lead to innocent users having their computers compromised.

All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.

Plus – don’t miss our featured interview with Acronis CISO Gerald Beuchelt!

Warning: This podcast may contain nuts, adult themes, and rude language.

Hosts:

Graham Cluley:

Carole Theriault:

Episode links:

Sponsored by:

  • Acronis – Integrated cybersecurity, data protection and endpoint management built for MSPs.
  • Threat Vector – The podcast from Palo Alto Networks that gives you timely analysis of current security trends and challenges.
  • Drata – The world’s most advanced Trust Management platform – making risk and compliance management accessible, continuous, and 10x more automated than ever before.

Support the show:

You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.

Become a Patreon supporter for ad-free episodes and our early-release feed!

Follow us:

Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.

Thanks:

Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.




Source link

spot_img

Related articles

F5 network compromised – Sophos News

On October 15, 2025, F5 reported that a nation-state threat actor had gained long-term access to some F5...

Event Tech Live and Rondayvoo connect exhibitors through new matchmaking tool

Event Tech Live has announced a new partnership with Rondayvoo by Event Engine to launch an...

What Is Ethical AI in E-Commerce and Why Does It Matter?

Ethical AI in e-commerce is the practice of designing, deploying, and managing artificial intelligence systems in a way...