MITE RADIO 0492 906 469
  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
    • Wayback Saturday Night
  • WAYS TO LISTEN
Picture
​

click here to listen
​to Mite radio (then click the red play arrow)
An initiative of ​The Stairway Project Inc
Picture

Infostealer Malware

13/5/2025

0 Comments

 
An alarming investigation by cyber intelligence researchers has uncovered a significant trove of compromised credentials circulating on platforms like Telegram and the dark web. The data includes at least 14,000 Commbank customer passwords, 7,000 ANZ credentials, 5,000 NAB accounts, and 4,000 belonging to Westpac users.
​


Picture

Despite the robust anti-fraud measures implemented by these major financial institutions, cybersecurity experts are warning that affected individuals face a "definite" risk of financial loss. This discovery follows recent cyberattacks targeting Australian superannuation funds, where stolen passwords were used in attempts to access pensioners' accounts.

The Australian cybersecurity firm Dvuln, which unearthed this extensive breach, has determined that these passwords were not obtained through vulnerabilities in the banks' systems. Instead, they were directly pilfered from users' own devices that had been infected with insidious "infostealer" malware.
​

So, "This is not a vulnerability in the banks. These are customer devices that have been infected."

Infostealer malware is a particularly dangerous form of malicious software designed to infiltrate devices, silently harvest a wide range of sensitive data – including passwords, credit card details, cryptocurrency wallet information, local files, and browser data like cookies and autofill information – and transmit it directly to cybercriminals.

With Infostealer, the threat extends far beyond just banking credentials, noting that the average infostealer victim has hundreds of other account details stored in their browser, including PayPal and e-commerce accounts with linked credit cards.

Figures suggest around 58,000 infected devices in Australia alone with something in the order of 31 million devices worldwide.

The biggest risks are in Windows devices around 90% although mobile device numbers are on the increase.

  • Avoid phishing scams - don’t fall victim to these messages.
  • Keep software updated.
  • Use a good AV software package and keep it updated.

If you suspect a problem, get onto your bank and alert scamwatch.
​

Ep325
Image created by AI
0 Comments

Staying Scam-Savvy in 2025

5/5/2025

0 Comments

 
As we move further towards the new tomorrow, our collective tech priorities should be around fortifying our digital defenses against the ever-evolving world of scams. While increased awareness is making a dent in scam success rates, complacency is a dangerous enemy. It's time for a security check-up to identify any weak spots that scammers might exploit.
Picture

​Here's a handy guide to five habits that can help you stay one step ahead of the scammers:

1. Master Your Passwords: If you're still using the same old password across multiple accounts, now's the time for an upgrade. Strong passwords or passkeys should be a complex mix of at least 14 characters, including uppercase and lowercase letters, numbers, and special symbols. Consider using a password manager like Bitwarden, 1Password, or NordPass to generate and securely store strong, unique passwords for all your accounts. And crucially, always enable multi-factor authentication (MFA) whenever it's offered for an extra layer of security.  

2. Sharpen Your Scam Radar:
Scammers are becoming incredibly skilled at impersonating trusted organizations like banks or government departments. Be extra cautious of unexpected emails or social media messages asking for your information or urging you to download software. Remember the mantra: stop, check, protect. Take a moment to breathe, independently verify the communication by contacting the organization directly through official channels, and then block and delete any suspicious messages. Be particularly careful when sending money to new accounts. Features like CommBank's NameCheck can help by verifying account details before your first payment.


3. Practice Good Banking Hygiene:
Your banking app likely has built-in security features – use them! CommBank's Security check up, for example, allows you to manage location-based security, which alerts the bank to unusual account access locations. Review and enable security alerts for suspicious activity notifications. Regularly check and adjust your daily payment limits to match your typical spending habits. Keeping limits higher than necessary increases your potential loss if your account is compromised.


4. Check In With Your Circle:
Scammers often thrive on isolation. A simple way to stay safe is to regularly check in with friends and family. As a spokesperson for the National Anti-Scam Centre points out, "Everyone is vulnerable to scams at certain times, such as dating and romance scams after a breakup or a job scam when the cost of living is high. Scammers isolate you from your support networks. They want to create a situation where you rely entirely on them." Talking about potential scams can help you and your loved ones identify red flags.


5. Report Every Scam Encounter:
Even if you haven't lost money, reporting scams is crucial. By reporting incidents to the National Anti-Scam Centre via scamwatch.gov.au, you provide valuable information that helps them understand scam tactics, identify vulnerable populations, and work on disrupting and stopping these criminal activities. As their spokesperson says, "Your reports help the National Anti-Scam Centre identify the scams that are causing the most harm to Australians."
​

Ep324
Image created by AI
0 Comments

SuperCard X - Tap and Beware

5/5/2025

0 Comments

 
Think twice before tapping! A sneaky new way for criminals to steal your money has popped up, and it uses your phone's tap-to-pay feature (NFC). It's like a "malware-for-rent" service called 'SuperCard X' that helps bad guys target Android phones.
​

Picture
Here's the simple version of how it works:
​
  1. Fake Message: You get a fake text or WhatsApp pretending to be your bank. It says there's a problem and you need to call a number.
  2. Smooth Talker: A crook answers, acting like a bank worker. They trick you into giving them your card number and PIN over the phone. They might even try to get you to raise your spending limits in your banking app.
  3. Fake App: They then convince you to download a seemingly harmless app (they might call it "Reader") that actually contains the SuperCard X malware.
  4. The "Tap" Trick: The app asks for very few permissions, mostly just to use your phone's NFC. The crook then tells you to tap your bank card on your phone to "verify" it.
  5. Secret Data Grab: When you tap, the hidden malware reads your card's information and secretly sends it to the criminals.
  6. Digital Copy: The crooks use this stolen info on another phone with a special app ("Tapper") that acts like a digital copy of your card.
  7. Easy Spending: Now, they can just tap their phone at stores and ATMs to make small, hard-to-trace purchases using your money.

This is particularly scary because:

  • Sneaky Taps: Because the transactions are small and look normal, banks might not flag them as fraud right away.
  • Hard to Detect: This malware is designed to be sneaky and isn't easily picked up by phone security software.

The bad guys behind this seem to be Chinese speakers, and they're even offering support to other criminals who want to use this method.
This scam has already been seen in Italy.


What Google says:

Google says their Play Protect system should help protect you from apps with this kind of malware if you download them from the official Play Store. But be careful about installing apps from anywhere else!

The bottom line: Be super careful about messages asking you to call numbers or download apps, especially if they're about your bank. Don't tap your card on your phone if someone you don't trust tells you to!

Ep323
Image created by AI
0 Comments

AI Powered Spam

16/4/2025

0 Comments

 
​Spam emails are getting smarter, thanks to artificial intelligence. Where old spam was full of typos, AI can now create convincing messages, making it harder to tell what's real. But don't worry, there are still ways to spot and block this new wave of AI-powered spam, according to Android Police.
Picture
Here are 8 key signs to watch for:
  1. Unusual Tone and Repetitive Buzzwords: AI can struggle with tone, so emails might sound too formal or strangely casual. Watch out for overused marketing phrases.
  2. Lack of Personalization: AI spam often uses generic greetings like "Hi there!" instead of your name. Legitimate emails usually include some personal details.
  3. Suspicious Links or Attachments: Be wary of emails that push you to click on links or download files. Check for misspellings in URLs or unexpected attachments.
  4. Inconsistent Visuals: Real companies have consistent branding. AI-generated emails might have blurry logos or mismatched colors.
  5. Details That Don't Match: If an email claims to be from a company but the email address looks wrong (e.g., a Gmail address instead of a company domain), it's a red flag.
  6. Generous Offers: Be suspicious of emails promising free gifts or deals that seem too good to be true.
  7. Repetitive Ideas: AI writing can sometimes repeat the same idea multiple times with slightly different wording.
  8. Pushy Requests for Personal Information: Be cautious of emails asking for personal details, as legitimate companies rarely do this through email.

How to Fight Back:
While you can't eliminate all spam, here's how to reduce it:
  • Mark as Spam: If you see a spam email, mark it as spam in your email provider. This helps your provider's filters learn.
  • Use an Alternative Email: Consider using a separate email address for online registrations to keep your main inbox cleaner.
  • Block Senders: Most email services let you block specific senders to prevent future emails. In Gmail, you can find this option in the three-dot menu next to the sender's details.
By staying vigilant and using these tips, you can protect your inbox from the growing threat of AI-generated spam.

​Ep322 - Image by AI
0 Comments

MS Defender Security

12/4/2025

0 Comments

 
Microsoft Defender for mobile encompasses a couple of offerings from Microsoft, aimed at protecting mobile devices from various threats.
Picture
Microsoft Defender for Individuals:
  • This is geared towards personal users and families, and it's tied to a Microsoft 365 Personal or Family subscription.
  • It's an all-in-one security app that provides features like:
    • Antivirus scanning.
    • Threat monitoring.
    • Protection against phishing.
    • Dark web monitoring for personal information.
    • Credit monitoring (in certain regions).
    • Identity theft protection.
  • Essentially, it aims to provide comprehensive online security for individuals and their families across their devices.
So if you have MS 365 and you login to the app, you get the top-tier protection including ransomware protection for your OneDrive files if you choose to enable it.

You can run it on all your devices linked to your MS account and have a central administration and notifications at your fingertips. Is it any good? So far, so good… time will tell.

Ep321 - Image source: https://www.microsoft.com/
0 Comments

Password Audit

12/4/2025

0 Comments

 
At the risk of harping on about it, I’m going to harp on about it!

Weak passwords are a digital welcome mat for cybercriminals. A password audit is essential for safeguarding your online presence.

​
The Essentials:
  • Strong Passwords: Aim for 14+ characters, a mix of uppercase/lowercase letters, numbers, and symbols (!@#$%^&*). Avoid easily guessed personal information.
  • Password Managers: Use tools like Bitwarden, 1Password, or NordPass to generate and securely store unique, complex passwords. They also identify weak passwords.
  • Multifactor Authentication (MFA): Enable MFA wherever possible. It adds a crucial second layer of security.​​
Picture

​
Conducting Your Audit:
  1. Account Inventory: List all online accounts.
  2. Password Strength Check: Use a password manager or online tool to assess password strength.
  3. Update Weak Passwords: Replace weak passwords with strong, unique ones.
  4. Enable MFA: Activate MFA for all applicable accounts.
  5. Regular Review: Schedule periodic audits to maintain security.

By prioritizing strong passwords and MFA, you significantly enhance your digital security.

​Ep321 - Image by AI
0 Comments

Google Play Store Protection

10/4/2025

0 Comments

 
Google is ramping up its efforts to create a safer Android ecosystem, announcing a slew of new security measures aimed at protecting users from fraudulent and malicious applications on the Play Store. The tech giant outlined its security roadmap, detailing plans to empower developers to build secure apps and help users distinguish genuine apps from deceptive ones.

A key component of this initiative is the expansion of Google Play Protect. Building upon its existing live threat detection capabilities, Play Protect will now specifically target "malicious applications that try to impersonate financial apps." This targeted approach aims to combat the growing threat of fraudulent financial apps that can steal user data and funds.


​
Picture
This move comes in response to recent security breaches on the Play Store, including a large-scale ad fraud campaign that saw users unwittingly downloading "vapor apps" disguised as popular, legitimate applications. These apps aggressively displayed recurring ads, generating substantial revenue for fraudsters and proving difficult for users to remove. Google was forced to remove 180 such apps from the platform, highlighting the urgent need for enhanced security measures.
​

To further bolster user trust and app authenticity, Google will be introducing more verified badges. Notably, VPN apps will receive a "Verified" badge, providing users with a clear indication of an app's legitimacy. This initiative aims to establish a more reliable and trustworthy Play Store environment.
​
Key Security Enhancements:
​
  • Expanded Google Play Protect: Enhanced threat detection targeting fraudulent financial apps.
  • Verified Badges: Increased use of verified badges, starting with VPN apps, to signify genuine applications.
  • Developer Security Tools: Improved resources and tools for developers to build secure apps from the outset.
  • AI-Backed Threat Detection: Continued development and implementation of AI-powered systems to detect and prevent malicious activity.

Google's commitment to strengthening Play Store security reflects the growing importance of mobile security in an increasingly digital world. These new measures are designed to protect users from evolving cyber threats and ensure a safer Android experience.

​Ep319 - Image by MITE Radio (screenshot)
0 Comments

Is your Android phone really up-to-date?

10/4/2025

0 Comments

 
Android users, beware! That reassuring "Your system is up to date" message might be a deceptive falsehood. Many Android devices harbor hidden, crucial updates that remain unnoticed and uninstalled for months, leaving users vulnerable and missing out on key features. The culprit? Google Play system updates.

For years, Android users have struggled with delayed updates, often waiting months, if not years, for manufacturers to release new Android versions or security patches. In 2019, Google introduced Project Mainline to address this, allowing them to directly update core OS components independently of manufacturers. These Google Play system updates deliver vital features, privacy enhancements, and security improvements.

However, a significant issue persists: these updates are often hidden and overlooked… so the message saying: ‘Your system is up to date’ might actually be hiding a pending update” This discrepancy is shockingly common across various Android devices.

Picture
Picture
Picture
What Are Google Play System Updates?
These updates are crucial for delivering features like Android 12’s Privacy Dashboard, the expanded Find My Device network, Theft Detection Lock, and improvements to Play Protect. They allow Google to bypass manufacturer delays and push updates directly to users.

The Hidden Update Problem
Despite their importance, Google Play system updates are often buried within Android settings. On Pixel devices, they're found under "Settings > Security & privacy > System & updates," separate from the main software update section. Many users are unaware of their existence, leading to significant delays. A recent poll indicated that 21% of users have no idea what these updates are.

"On my Pixel 7, my daily driver, where the main software is up to date with the March security patch, the Play system was lagging on a February release. I updated it to the March release and then once more with a more recent March release. And I’m very diligent about this! Imagine if I wasn’t." one user reported.

Why the Secrecy?
The reason behind Google's lack of transparency remains a mystery. The separation of update menus and the absence of clear notifications contribute to the problem. The very name, "Google Play system updates," is misleading, as many updates have little to do with the Play Store.

The core issue is the lack of user notification. Google could easily implement a simple alert when a Play system update is available, but they choose not to. As a result, updates often remain pending until a device restart, which many users perform infrequently. This lag defeats the purpose of Project Mainline, which aimed to deliver updates promptly.

How to Check for Updates
To check for Google Play system updates:
  • Pixel Devices: Go to Settings > Security & privacy > System & updates.
  • Other Android Devices: Use the settings search bar and type "Play system update."

Regularly checking for these updates is crucial to ensure your device is secure and up-to-date.

The Bottom Line
Google's failure to adequately inform users about Play system updates is a significant oversight. While the updates are designed to streamline and improve Android, their hidden nature undermines their effectiveness. Until Google addresses this issue, Android users must remain vigilant and proactively seek out these essential updates… every month.

Ep319 - Images by MITE Radio (screenshots)
0 Comments

Tax Time Scams

9/4/2025

0 Comments

 
We need to always be vigilant in regards to scams and our data security and even more so as particular events loom, like the EOFY TAX time.

As the tax filing deadline approaches, scammers are ramping up their efforts, exploiting the heightened sense of urgency to trick individuals into divulging sensitive information. A recent phishing campaign highlights the cunning tactics employed by cybercriminals during this critical time.


​
​
Picture
One alarming example involves an email with the subject line "Urgent reminder," containing a PDF attachment with a QR code. The email, purporting to be from the "Tax Services Department," warned recipients of a "mandatory review and update" of their tax records, claiming it needed to be completed by a certain deadline, to avoid penalties. The email instructed recipients to scan the QR code or click a link to access a "secure tax portal."

However, this was a carefully crafted phishing attempt. Scanning the QR code led to a malicious website, cleverly concealed through doubleclick.net redirects. Fortunately, cybersecurity software like Malwarebytes detected and blocked the real destination.

​
Upon bypassing bot protection, the phishing site presented a Microsoft login page, pre-filled with an email address, prompting users to enter their password. Entering credentials would send them directly to a Russian receiver, who could then sell the information on the dark web or use it to access the victim's Microsoft accounts.

This is just one example of the numerous tax scams circulating during this period. The IRS's annual "Dirty Dozen" list highlights common schemes that threaten taxpayers' financial information. One prevalent tactic involves spreading misinformation on social media, such as promoting non-existent tax credits like the "self-employment tax credit," which led the IRS to issue a warning last year.

Phishing emails, like the one described, remain a significant threat. While AI-generated emails can appear convincing, certain red flags can help identify them:
  • "Too good to be true" offers: Promises of large, unexpected tax returns are often used to lure victims.
  • Sense of urgency: Scammers create a sense of panic to prevent victims from thinking critically.
  • Unusual contact methods: The IRS rarely initiates contact via email, especially for sensitive information.

Protecting Yourself from Scams:
In an increasingly digital world, online scams are becoming more sophisticated. To protect yourself, consider these tips:
  • Verify website legitimacy: Always check the website's address bar and be wary of sponsored search results.
  • Be cautious of unsolicited contact: Avoid responding to unsolicited calls or emails, especially those demanding immediate action.
  • Use official channels: Contact organizations directly through their official websites or phone numbers.
  • Secure sensitive information: Never send personal details like bank account or Social Security numbers via email. Use secure methods on IRS.gov.
  • Employ robust security software: Use security software like Malwarebytes Premium to block phishing domains and scam sites.
  • Educate yourself: Familiarize yourself with the IRS's guidelines on identifying legitimate communication.

The rise in sophisticated scams emphasizes the need for vigilance during tax season. By staying informed and taking precautions, individuals can protect themselves from becoming victims of these fraudulent schemes.

​Ep 318 - Image by AI
0 Comments

Phishing for CBA details

7/4/2025

0 Comments

 
CommBank has issued a stark warning to its customers regarding a surge in fraudulent SMS messages designed to steal sensitive personal and financial information. These phishing attempts are becoming increasingly sophisticated, posing a significant risk to unsuspecting individuals.
The fraudulent SMS messages are designed to trick customers into clicking on malicious links or calling fake phone numbers. These actions then prompt victims to disclose crucial information, including:
​
  • Credentials: Netbank IDs, CommBiz IDs, passwords, and token codes.
  • Personal Identifiers: ID details, addresses, phone numbers, and dates of birth.
  • Account Details: Account and card numbers.

Alarmingly, these messages may appear legitimate, even appearing within the same message threads as genuine CommBank communications. However, CommBank has explicitly stated that they will never request transaction verification through links in emails or SMS messages.​
Picture
Protecting Yourself from These Phishing Scams:
CommBank strongly advises customers to adhere to the following safety precautions:
  • Verify Contact Information: Always confirm the correct contact information for CommBank by visiting the official website: commbank.com.au/support/contact-us.html.
  • Access Banking Securely: Only access your banking services through the official CommBank app or by visiting CommSec, CommBiz, and NetBank directly from a trusted and secure location. Never click on links provided in SMS messages or emails.
  • Be Suspicious of Information Requests: Exercise extreme caution when receiving any message that requests sensitive personal or financial information. Be wary of messages that instruct you to perform tasks such as updating software or granting remote access.
  • Do not trust messages that pressure you to act quickly.

By remaining vigilant and following these guidelines, CommBank customers can significantly reduce their risk of falling victim to these pervasive phishing scams.

​Ep317 - Image screenshots by MITE Radio
0 Comments

Remote Access Scams

7/4/2025

0 Comments

 
Remote access scams continue to plague Australian businesses and individuals, with criminals employing increasingly sophisticated tactics to gain control of computers and siphon funds. These scams, often initiated with phone calls impersonating reputable organizations, are a significant concern, with NAB reporting them as a top scam impacting their customers.

Picture
A particularly alarming trend is the targeting of business customers, with criminals impersonating NAB personnel and fabricating stories about new chat bots, updated versions of NAB Connect, or urgent technical issues. These fabricated scenarios are designed to deceive victims into downloading malicious software, granting criminals remote access to their computers and sensitive online banking information.

"We anticipate criminals will continue to target Australian consumers and businesses with remote access scams in 2025," warns Chris Sheehan, Executive of Group Investigations at NAB. He further emphasized the severity of these scams, noting that losses can escalate into tens of thousands of dollars within minutes, significantly exceeding the financial impact of other common scams. Older Australians are also disproportionately targeted, due to criminals believing they are more susceptible to these tactics.


Safeguarding Your Business and Personal Information:
​

To protect yourself and your business from these insidious scams, adhere to the following crucial guidelines:
  • Never Grant Remote Access: Under no circumstances should you provide unexpected individuals with remote access to your computer or online bank accounts.
  • Protect SMS Codes: Never share SMS verification codes sent by your bank or any other financial institution.
  • Verify Contact Independently: If you receive unsolicited contact that raises suspicion, immediately terminate the interaction. Independently verify the organization's legitimacy by contacting them directly using contact details you have sourced yourself.
  • Maintain Software Updates: Regularly update your computer software and applications to patch security vulnerabilities that criminals could exploit.

The speed and scale of financial losses associated with remote access scams underscore the urgent need for heightened vigilance. By adopting these preventative measures, individuals and businesses can significantly reduce their risk of becoming victims.

​Ep316 - Image by AI
0 Comments

Solar Inverter Attacks

5/4/2025

0 Comments

 
Picture
It seems that nothing is free from the risk of cyber attack and the latest candidate is the humble Solar Inverter sitting on your roof.
Imagine someone hacking into your home's solar panels and messing with how much power they produce. That's what security researchers found could happen with some popular solar panel systems.

​
The Problem:
  • Researchers found serious security holes in solar panels made by companies called Sungrow, Growatt, and SMA.
  • These holes could let hackers control your solar panels from far away, through the internet.
  • This isn't just about your home; it could affect the whole power grid.

What Could Happen:
  • Hackers could turn your solar panels on and off, or change how much power they make.
  • If they hacked into a lot of solar panels at once, they could cause problems for the power grid, like blackouts.
  • Hackers could also steal your personal information or control other smart devices in your home that are connected to the same system.

Why This Matters:
  • Solar panels are becoming more common, so this is a growing problem.
  • If hackers mess with enough solar panels, they could cause big problems for everyone's electricity.
  • It's also a privacy issue, as hackers could get into your home network.

The Good News:
  • The companies that make these solar panels have been told about the problems.
  • They've released updates to fix the security holes.
  • If you have these solar panels, make sure they are updated with the latest software.

What You Can Do:
  • If you have solar panels, check who made them.
  • Make sure they have the latest software updates.
  • Keep your home network secure with strong passwords and firewalls.

Basically, just like your computer or phone, your solar panels need to be protected from hackers. By keeping them updated and secure, you can help keep your home and the power grid safe.

​Ep315 - Image created by AI
0 Comments

Bucket List Scams

2/4/2025

0 Comments

 
The excitement surrounding highly anticipated international music tours and new European visa requirements is being exploited by opportunistic scammers, turning once-in-a-lifetime experiences into financial pitfalls. These "bucket list" scams are on the rise, particularly on social media and digital platforms, highlighting the urgent need for a unified national strategy to combat online fraud.
​
Picture

​The core tactic involves enticing victims with the promise of sold-out tickets to coveted events or expedited visa processing. In many cases, buyers pay for items that either don't exist or receive random or counterfeit goods. Other variations include inflated prices for legitimate products or services, leaving victims significantly out of pocket.

"We anticipate ticket scams when Oasis and Metallica tour, similar to those seen with Taylor Swift and Coldplay in 2024," warns Chris Sheehan, Executive of Group Investigations at NAB. This predictive statement underscores the recurring nature of these scams, with criminals consistently capitalizing on high-demand events.

Protecting Your Bucket List from Scammers:

To avoid falling victim to these heartless scams, consider these preventative measures:

  • Official Resellers First: For sold-out tickets, prioritize purchasing through official resellers rather than relying on social media marketplaces.
  • Direct Communication: If possible, contact the seller or organization directly via phone before sending any money. This allows for a more personal interaction and can help identify suspicious behavior.
  • Thorough Social Media Scrutiny: Carefully examine the seller or organization's social media profile. Pay attention to the account's creation date, activity level, and any existing reviews.
  • Reverse Image Search: Conduct a reverse image search of any tickets, visa authorizations, or proof of purchase provided. If the same image appears on multiple websites, it's a strong indication of a scam.
  • Payment Method Awareness: Be cautious when using payment methods for private sales, as they often offer limited or no protection if the items are fraudulent.

By exercising vigilance and adhering to these safety guidelines, individuals can better protect their hard-earned money and ensure their bucket list dreams don't turn into financial nightmares.
​
Ep314
Image created by AI
0 Comments

NAB’s Take on AI Deepfakes

2/4/2025

0 Comments

 
A recent article from National Australia Bank has highlighted a disturbing trend in the use of AI-powered scams. In particular they are leveraging deepfake technology to impersonate Australian politicians and well-known personalities. Criminals are using these lifelike fabrications to promote fraudulent investment opportunities and products on social media, leaving unsuspecting individuals vulnerable.
​


Picture

The sophisticated nature of these scams is alarming. With just a few seconds of audio or a single image gleaned from social media profiles, voicemails, or publicly available videos, scammers can generate convincing deepfakes. These AI-generated impersonations are becoming increasingly difficult to distinguish from genuine content, making it easier for criminals to manipulate their targets.

Chris Sheehan, Executive of Group Investigations at NAB, highlighted the evolving tactics of these criminals. "AI allows criminals to 'nudify' and manipulate photos from social media instead of relying on images people have shared with them," he warned. While NAB has not yet reported widespread cases of AI-generated sextortion impacting their customers, the bank is closely monitoring the situation overseas, recognizing the devastating consequences such scams can inflict.

Protecting Yourself from AI-Driven Scams:

In light of this growing threat, experts are urging Australians to exercise extreme caution and adopt proactive measures to safeguard themselves. Here are some key tips:
​
  • Be Skeptical of High-Profile Endorsements: Treat any investment opportunity promoted by a well-known figure with a high degree of skepticism. Conduct thorough, independent research before committing any funds.
  • Verify Investment Opportunities: Access investment platforms and information directly through verified sources, rather than clicking on links found in social media ads or sponsored search results.
  • Verify Payment Requests: If you receive a payment request that seems suspicious, even from a known contact, independently verify its legitimacy by calling the person directly using contact information you have verified yourself.
  • Secure Your Social Media: Set your social media profiles to private and carefully review friend requests and connections to minimize the risk of your images being used for nefarious purposes.
  • Report Sextortion Attempts: If you are threatened with the release of manipulated images, immediately cease all contact with the perpetrator. Report the incident to the e-Safety Commissioner and notify your bank if you have already made a payment.

​The rise of AI-driven scams underscores the importance of heightened vigilance in the digital age. By staying informed and adopting proactive safety measures, individuals can better protect themselves from these increasingly sophisticated threats.


Ep312
Image created by AI
0 Comments

Password Reuse

2/4/2025

0 Comments

 
Despite constant warnings and technological advancements, a staggering 50% of internet users continue to reuse passwords across multiple accounts, placing themselves at significant risk of cyberattacks. While the intricacies of password construction are important, experts highlight that the core issue in Australia lies in poor password management. This is demonstrated by studies showing that Australians are aware of the risks involved in password reuse, but still do it anyway.
Picture

Research consistently shows a disconnect between awareness and action in Australia. Reports highlight a persistent problem: users prioritize convenience over security. 84% of respondents admitted to "unsafe password practices," including incorporating easily guessable personal information like favorite numbers, pet names, birthdays, or names of loved ones into their passwords. In an age of rampant social media sharing, this practice makes accounts incredibly vulnerable to social engineering attacks.

Password Reuse: A Cybercriminal's Dream:

However, the most alarming statistic is the 50% of users who reuse passwords across at least two accounts. This practice creates a domino effect: if one account is compromised, all accounts sharing the same password are at risk. Even seemingly insignificant websites can become the weak link in a chain of security breaches.

"Sharing login information with friends and family members has become increasingly common in an era where things like streaming services, collaborative social media accounts, and more are popular," the All About Cookies analysts said. While sharing logins itself is risky, the widespread reuse of passwords across unrelated accounts is a far more dangerous trend.

A Slight Improvement, But Still Cause for Concern:
​

While the analysis did reveal a slight improvement from the previous year, when 65% of users reused passwords, the current figure remains alarmingly high. This minor decrease offers little comfort when considering the potential consequences of a single compromised password.

Solutions and Recommendations:

To mitigate the risks associated with password reuse, experts strongly recommend the following:
​
  • Never Reuse Passwords: Each account should have a unique, strong password.
  • Utilize a Password Manager: These tools generate and securely store complex passwords, eliminating the need to remember them.
  • Embrace Passkeys: Where available, passkeys offer a more secure and user-friendly alternative to traditional passwords.
  • Change Passwords Immediately: If you suspect any account may be compromised, change the password immediately.

The persistent issue of password reuse underscores the need for a fundamental shift in user behavior. While technological solutions exist, the ultimate responsibility lies with individuals to adopt secure password management practices. Failure to do so leaves them vulnerable to a wide range of cyber threats.

Ep311
Image created by AI
0 Comments

Cryptocurrency Scams

31/3/2025

0 Comments

 
The allure of quick riches in the volatile cryptocurrency market has become a breeding ground for sophisticated scams, leaving Australians vulnerable to devastating financial losses. Criminals are exploiting the "fear of missing out" (FOMO), enticing victims with promises of high returns through fake trading apps and fraudulent websites.

​
Picture

These scams often begin with seemingly legitimate investment opportunities, designed to build trust. Victims may even see small profits or be able to withdraw a small amount of money, reinforcing the illusion of a successful investment. However, when larger withdrawals are attempted, victims are met with a barrage of fabricated obstacles, including unexpected fees, tax issues, or complete account lockouts.

Chris Sheehan, Executive of Group Investigations at NAB, highlighted the concerning trend: "Older Australians may not be as familiar with the digital currency and terms like digital wallets and tokens, while under 50s are the fastest growing age group to lose money nationally to crypto investment scams." This demonstrates the broad reach of these scams, targeting individuals across all age demographics.

Adding to the financial strain, criminals are also capitalizing on the current cost-of-living pressures by promoting term deposit investment scams, further exploiting the desire for secure financial growth.


Protecting Yourself from Cryptocurrency Investment Scams:

To combat this rising tide of financial fraud, experts are urging Australians to adopt a cautious approach and implement the following protective measures:
​
  • Verify Credentials: Always confirm that the individual or entity offering investment opportunities holds an Australian Financial Services (AFS) license. Independently verify their contact details and communicate through these channels.
  • Check for AUSTRAC Registration: Ensure that any cryptocurrency exchange you are considering is registered with AUSTRAC. Look for the registration number on the exchange's website.
  • Conduct Thorough Research: Search for independent reviews of the investment offer and the company involved. Include keywords like "scam" in your search to identify potential red flags.
  • Consult ASIC's Investor Alert List: Regularly check ASIC's investor alert list, which provides information on suspicious companies, businesses, and websites. This resource can help you identify and avoid potential scams.

By staying vigilant and adhering to these safety guidelines, Australians can significantly reduce their risk of falling victim to the increasingly prevalent cryptocurrency investment scams.


Ep313
Image created by AI
0 Comments

Gambling Data is Leaking

11/3/2025

0 Comments

 
In a disturbing revelation that casts a long shadow over the online gambling industry, a recent investigation has uncovered a widespread practice of gambling websites secretly sharing user data with Facebook's parent company, Meta. This clandestine data transfer, happening without explicit user consent, raises serious concerns about privacy violations and potential breaches of data protection laws.

Picture
An investigation by The Observer revealed that over 150 UK gambling websites were using a hidden tracking tool, the Meta Pixel, to extract and transmit visitor data to Meta. This data, which includes details of webpages visited and buttons clicked, is then used to profile individuals as gamblers, paving the way for targeted Facebook advertising from casinos and betting sites.

The sheer scale of this practice is alarming. Popular gambling platforms like Hollywoodbets, Sporting Index, Lottoland, and Bwin were among those implicated in the data sharing. Of the tested websites, 52 were found to be directly sharing data via Meta Pixel without obtaining explicit user consent. Crucially, this data transfer often occurred automatically upon webpage loading, before users even had the opportunity to accept or decline data usage.

The consequences of this covert data collection are significant. One reporter, who explicitly stated they had never consented to marketing data usage, found themselves bombarded with gambling advertisements. In a single browsing session, they encountered ads from 49 different brands, including those from companies not directly involved in the illicit data sharing, but who were utilizing Meta Pixel within accepted rules.

Data privacy expert Wolfie Christl condemned the practice, stating, "Sharing data with Meta is highly problematic, even with consent, but doing so without explicit informed consent shows a blatant disregard for the law. Meta is complicit and must be held accountable."

This is not the first instance of gambling sites being accused of unlawfully selling user data, fueling ongoing calls for a comprehensive investigation into the targeting of gamblers and the implementation of stronger protective measures.

​I guess we’ll expect to hear about the upcoming legal action.


If you’re using these sites (i.e. online and not an app) consider using privacy focussed browsers like Brave and maybe don’t say yes to all the cookies.

Ep310
Image created by AI
0 Comments

I’ve been Scammed…

8/3/2025

0 Comments

 
IDCARE is a not for profit service in Australia and New Zealand, providing crucial support to individuals and organisations affected by identity theft and cybercrime. Here's a summary of what they do:
​

Picture

  • National Identity & Cyber Support:
    • IDCARE is a free, national support service.
    • They specialize in assisting people who have experienced the compromise and misuse of their personal information.
  • Services Provided:
    • They offer expert case management support, counseling, and technical remediation.
    • They help individuals navigate the complexities of recovering from identity theft, scams, and cyberattacks.
    • They also provide support to organizations that have experienced data breaches.
  • Scope of Assistance:
    • IDCARE addresses a wide range of cyber security concerns, including:
      • Identity theft
      • Scams (phishing, romance scams, investment scams)
      • Data breaches
      • Hacking
      • Lost or stolen credentials
  • Community Outreach:
    • IDCARE conducts cyber resilience outreach clinics, particularly in vulnerable communities, to raise awareness and promote preventative measures.
  • Key Role:
    • In the face of increasing cybercrime, IDCARE plays a critical role in helping individuals and organizations recover from these incidents.
    • They are a very valuable resource for people who have been affected by data breaches, such as the recent Medsecure data breach.

​In essence, IDCARE is a crucial resource for Australians and New Zealanders seeking assistance with identity theft and cybercrime.

Ep309
Image Source: https://www.idcare.org/contact/get-help
0 Comments

Google QR Codes for 2FA

8/3/2025

0 Comments

 
In a move welcomed by cybersecurity experts, Google is phasing out SMS-based two-factor authentication (2FA) in favor of QR codes, a significant step towards bolstering user security. While SMS 2FA has long been a staple for account protection, its vulnerabilities have become increasingly apparent, making it a prime target for hackers.
Picture

Why Ditch SMS? The Security Flaws Exposed

The convenience of receiving a text message code has masked its inherent security weaknesses. As highlighted by many, the ease with which scammers can intercept SMS codes is alarming. Whether through SIM swapping – tricking mobile carriers into transferring your phone number – or sophisticated phishing techniques, hackers can gain access to your 2FA codes remotely.

This vulnerability leaves users exposed to fraud and account takeovers, particularly when sensitive information like bank accounts are protected by SMS-based 2FA. Furthermore, the rise of "traffic pumping" scams, where fraudsters manipulate SMS delivery for profit, contributes to the growing problem of SMS spam.

Google's Solution: QR Codes for Enhanced Authentication

Recognizing the limitations of SMS, Google is opting for QR codes as the default verification method for phone numbers. This transition promises a more secure and user-friendly experience.

Here's how it works:

  • QR Code Prompt: When logging in on a new device, users will be presented with a QR code.
  • Smartphone Scan: Users can then scan the QR code using their smartphone to authenticate the login.
  • Enhanced Security: This method eliminates the need for shareable codes, thwarting phishing attempts. Additionally, the proximity-based nature of QR code scanning bypasses the vulnerabilities associated with carrier networks and online servers.

Beyond QR Codes: Embracing Authenticator Apps and Passkeys

While QR codes offer a significant improvement, Google also champions other robust authentication methods. Authenticator apps, which generate time-based one-time passwords (TOTPs) on secure, user-controlled services, provide an additional layer of security. These apps often feature biometric authentication and password protection.

For those seeking the ultimate in security, Google advocates for passkeys. These cryptographically generated keys, unique to each login and device, eliminate the need for traditional passwords. Passkeys remain securely encrypted on the user's device, making them virtually impervious to hacking.


The Future of Secure Logins
​

Google's shift away from SMS 2FA marks a pivotal moment in online security. While a precise timeline for the QR code rollout remains undisclosed, this move underscores the importance of adopting stronger authentication methods.

​In an increasingly digital world, prioritizing security is paramount. By embracing QR codes, authenticator apps, and passkeys, users can significantly reduce their risk of falling victim to cyberattacks. Google's initiative serves as a reminder that staying ahead of evolving threats requires continuous innovation and a commitment to user protection.


Ep308
Image created by AI
0 Comments

Is This a Scam?

8/3/2025

0 Comments

 
If you’ve seen an advert or a webpage suggesting something too good to be true or something for sale at a ridiculous price, try asking AI for a sanity check.
​

Hey AI can you help me see if this is a scam?
​


Picture

Yes, you can absolutely upload a webpage link and ask me if it appears to be a scam. I will do my best to analyze it based on:

  • Website Design and Credibility:
    • I'll look for red flags like poor grammar, unprofessional design, or suspicious URLs.
  • Content Analysis:
    • I'll examine the text for unrealistic claims, urgent requests, or suspicious offers.
  • Security Indicators:
    • I'll check for HTTPS encryption and any security warnings.
  • Known Scams and Patterns:
    • I'll compare the website to known scam tactics and databases.
  • Domain Information:
    • I can look up when the domain was registered, and other information related to the domain.

However, please keep in mind:

  • I cannot guarantee 100% accuracy. Scammers are constantly evolving their tactics.
  • My analysis is based on available information and my judgment.
  • It is always best to exercise caution and trust your instincts.

So, please provide the link, and I'll do my best to help you determine if it's a scam.

​Might not be 100% but it’s better than nothing right?

Ep307
Image created by AI
0 Comments

Interest Free Scams

8/3/2025

0 Comments

 
We've received a concerning report from a listener about a solar power financing offer that raises serious red flags.

​A local Perth resident was looking into installing solar panels and received an offer for "interest-free" financing through Zip Pay. However, the company requested something highly unusual: the applicant's online banking login details. They said this was to assess their financial situation.


​
Picture
Now, this is where things get concerning. Not only were they asking for direct access to the bank account, but they also stated that a separate, unidentified third-party company would also be given access to this sensitive information.

Experts warn that sharing your bank login details with anyone is incredibly risky. It opens you up to potential fraud, identity theft, and financial losses. Most reputable financial institutions advise against this practice.

Consumer advocates are urging people to be very cautious about this very thing. They say that while "interest-free" offers can be tempting, they shouldn't come at the cost of your financial security. There are legitimate ways for companies to assess financial risk without needing your login credentials.

This situation also raises privacy concerns. The fact that an unknown third party would also have access to the data is troubling.

So, what should you do if you encounter a similar offer?

  • First, never share your bank login details.
  • Explore alternative financing options from well-known lenders.
  • Report any suspicious activity to consumer protection agencies.
  • Thoroughly research any company before signing any agreements.
  • Look into government rebates and incentives for solar power.

Remember, protecting your financial information is crucial. If an offer seems too good to be true, it probably is. Stay vigilant and informed.
​

This incident serves as a stark reminder of the importance of protecting personal financial information and exercising caution when considering financing offers that seem too good to be true. Authorities are urging individuals to remain vigilant and report any suspicious activity.

Ep306
Image created by AI
0 Comments

2FA Hijacking

28/2/2025

0 Comments

 
A new phishing kit called Astaroth is exploiting a vulnerability in two-factor authentication (2FA), putting millions of Gmail and Outlook users at risk.

The kit, which was first advertised last month, allows hackers to steal 2FA codes and session cookies in real-time, effectively bypassing this critical security measure. This is achieved through a "man-in-the-middle" attack, where the user is redirected to a fake login page that mimics the appearance of the legitimate site.
​
Picture
This type of attack bypasses two-factor authentication through session hijacking and real-time credential interception.

Traditional phishing attacks typically capture only primary credentials, leaving 2FA intact. However, Astaroth intercepts all authentication data in real-time, rendering 2FA ineffective.

How the Attack Works:

  1. Users click on a malicious link, often disguised within a seemingly legitimate email or message.
  2. They are redirected to a fake login page that mirrors the appearance of Gmail, Outlook, or another email platform and you are prompted to login.
  3. When users enter their login credentials and 2FA code, this information is instantly captured by the attackers.
  4. The attackers can then access the user's account, even though they have the correct 2FA code.

What You Can Do:

  • Never click on links in emails or messages, even if they appear to be from a trusted source.
  • Always navigate to login pages directly through your browser or app.
  • Be wary of any suspicious pop-up windows or requests for personal information.
  • Consider using passkeys, a more secure authentication method that is not vulnerable to this type of attack.

This phishing kit is readily available for purchase on cybercrime marketplaces for $2,000, making it a serious threat to users. It is crucial to remain vigilant and follow best practices to avoid falling victim to this attack.

Ep305
Image created by AI
0 Comments

Do the Scam Quiz

28/2/2025

0 Comments

 
Take the 2 minute quiz on the scamwatch website and test your understanding. (multiple choice)

1. What are some common signs that you are dealing with a scammer?

2. Phishing scams are attempts by scammers to deceive you into sharing your personal information. 

​
Which of the following can you rely on, to be sure you aren't dealing with a phishing scam?

3. You receive a call or message from an organisation you think you know, claiming your device or accounts aren't secure. What do you do?

4. Which of the following is a common tactic used by scammers to get you to give them money quickly?

5. What’s the first thing you should you do if you think you've had money or information stolen by a scammer?

6. Scammers may intercept and modify invoices or call you to change bank account details on a bill you’re expecting.

What can you do to stay safe from these scams?

7. Which of the following is the best way to protect yourself from online shopping scams?

8. What does Scamwatch recommend people do to stay safe from scams?
​

Picture
Ep304
Image Source: https://www.scamwatch.gov.au/
0 Comments

Protect Your Facebook Account

28/2/2025

0 Comments

 
A sophisticated phishing campaign targeting Facebook users is underway, demanding immediate attention to safeguard your personal data. Security experts at Check Point have issued a critical alert, revealing a widespread attack that leverages the Facebook brand to steal credentials and compromise accounts.
​

Picture

Thousands Targeted in Ongoing Phishing Scheme

This campaign, since it was detected, has reached over 12,000 individual email addresses and numerous organizations. Primarily targeting users in the U.S. and Europe, with some Australian victims, the attack poses a significant threat due to Facebook's massive user base.

Deceptive Tactics Employed

Cybercriminals are using a clever tactic to appear legitimate. The phishing emails are sent via an automated mailing service, leveraging Salesforce's marketing tools, and use a "[email protected]" return address. This adds a layer of authenticity, making the emails harder to distinguish from legitimate communications.

The emails themselves are designed to instill fear and urgency. They claim a copyright infringement violation, prompting recipients to click a link to a fake Facebook support page. This page then requests account credentials under the guise of an "account review," rather than a direct account disablement threat, which is a subtle, but effective, psychological manipulation.

The Danger of Phishing Kits

Adding another layer of severity to this attack, new reports indicate the use of phishing kits. These kits make it easier for cybercriminals to launch these attacks, even those with limited technical skills. This means the number of attacks could drastically increase.

What You Need to Do Immediately: cue the broken record…

  • Be Suspicious of Emails:
    • Treat any email claiming copyright infringement or demanding immediate action with extreme caution.
  • Verify Directly:
    • Never click on links in suspicious emails. Instead, navigate directly to Facebook's official website or app to check for any notifications.
  • Check Sender Addresses:
    • While the "[email protected]" address adds legitimacy, always scrutinize the full sender address and look for any inconsistencies.
  • Enable Two-Factor Authentication (2FA):
    • Adding 2FA to your Facebook account provides an extra layer of security, making it harder for hackers to gain access even if they have your password.
  • Educate Yourself and Others:
    • Share this information with friends and family to help them avoid falling victim to these attacks.
  • Keep Software Updated:
    • Ensure all your devices and security software are updated. Updates often contain crucial security patches.
  • Report Phishing:
    • If you receive a phishing email, report it to facebook.

The Importance of Vigilance

This Facebook phishing campaign serves as a stark reminder of the constant threat posed by cybercriminals. Staying vigilant and practicing safe online habits are crucial for protecting your personal information and avoiding becoming a victim.

Ep303
Image created by AI
0 Comments

Update Your Browsers

28/2/2025

0 Comments

 
In today's digital world, online threats like malware, scareware, and intrusive pop-ups are a constant concern. But did you know that your web browser is a powerful tool in your defense arsenal? Keeping your browser consistently updated is crucial for maximizing its protective capabilities and staying safe online.

Picture
Why Updates Matter: A Security Power-Up
​

Browser developers are constantly working to improve security features and patch vulnerabilities that cybercriminals exploit. These updates are not just about adding new features; they're vital for safeguarding your digital experience. Here's how:
​

  • Patching Security Holes:
    • Cybercriminals are adept at finding weaknesses in software. Browser updates often include critical security patches that close these gaps, preventing malware and scareware from infiltrating your system.
  • Enhanced Threat Detection:
    • Modern browsers incorporate sophisticated "safe browsing" features that analyze websites and downloads for suspicious activity. Updates ensure these systems have the latest threat intelligence, allowing them to identify and block emerging dangers.
  • Blocking Deceptive Tactics:
    • Scareware and malicious pop-ups often rely on trickery and deception. Updated browsers are better equipped to recognize these tactics, providing clear warnings and preventing unwanted intrusions.
  • Strengthening Built-in Defenses:
    • Browsers continuously enhance their built-in security features, such as pop-up blockers, phishing protection, and malware scanners. Regular updates ensure you have the latest and most effective versions of these tools.

Beyond Updates: Smart Browsing Habits

While keeping your browser updated is essential, it's also crucial to practice safe browsing habits:

  • Be Cautious of Links:
    • Avoid clicking on links from unknown sources or suspicious emails.
  • Verify Website Authenticity:
    • Double-check website URLs and look for secure connections (HTTPS).
  • Download from Trusted Sources:
    • Only download software and files from reputable websites.
  • Utilise Security Software:
    • Complement your browser's security with robust antivirus and anti-malware software.

The Bottom Line: Proactive Protection

In the ongoing battle against online threats, staying proactive is key. By keeping your browser updated and practicing safe browsing habits, you can significantly reduce your risk of falling victim to malware, scareware, and other browser-based attacks. Take control of your online security and make browser updates a regular part of your digital routine.

Ep302
Image created by AI
0 Comments
<<Previous
Forward>>

    Author

    Delve into the world of MITE Radio through our captivating blogs. From music and tech to community news, our articles offer fresh perspectives and behind-the-scenes glimpses. Stay informed, connect with our community, and explore MITE Radio in a new way today!

    Archives

    June 2025
    May 2025
    April 2025
    March 2025
    February 2025
    January 2025
    December 2024
    November 2024
    October 2024
    September 2024
    August 2024
    July 2024
    June 2024
    May 2024
    April 2024
    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    June 2023
    May 2023
    April 2023

    Categories

    All
    AI
    App Of The Day
    Bytes & Beats
    Cyber Security
    Discussion
    Gadgets & Gizmos
    Game
    Innovation Hub
    Listener Question
    News
    Other
    Somethin' For Nothin'
    The Tech Absurd
    Tips & Tricks

    RSS Feed



  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
    • Wayback Saturday Night
  • WAYS TO LISTEN