A podcast that brings you timely stories, news and tips for living securely in a connected world. Topics include Information Security, Privacy, Internet of Things (IoT), Mobile Devices, Applications and Social Media. Hosted by Scott Wright Cyber Security Auditor, Researcher and Coach, President of Security Perspectives Inc. and Tom Eston Ethical Hacker and Information Security Professional.
Date | Title & Description | Contributors |
---|---|---|
2024-12-02 | In this episode, we discuss Australia’s new legislation banning social media for users under 16 and its potential impact. Our hosts also explore the issue of vishing (voicemail phishing), why it’s escalating, particularly during the holiday season, and... |
|
2024-11-25 | In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers ... |
|
2024-11-18 | In episode 355, Tom discusses his decision to deactivate his Twitter accounts due to privacy concerns with Twitter’s new AI policy and changes in the blocking features. He outlines the steps for leaving Twitter, including how to archive and delete twee... |
|
2024-11-11 |
Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election outcomes while exploring the rise of teenage hackers re... |
|
2024-11-04 |
Fallout from the Change Healthcare Breach, Mortgage Wire Fraud What You Need To Know In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million Americans, including hosts Tom and Kevin. ... |
|
2024-10-28 | In this episode, we discuss the significant data breach at the Internet Archive, affecting 33 million users. We also examine the introduction of an AI-integrated toilet camera by Throne, designed for health monitoring by analyzing bodily waste, and the... |
|
2024-10-21 | In episode 351, hosts Tom and Scott explore an unusual incident where robot vacuums were hacked to shout obscenities, exposing significant IoT security issues. The discussion includes the mechanics of the Bluetooth hack and its broader cybersecurity im... |
|
2024-10-14 |
Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits In the milestone 350th episode of the Shared Security Podcast, the hosts reflect on 15 years of podcasting, and the podcast’s evolution from its beginnings in 2009. They discuss the impact of a current hurricane on Florida, offering advice on using iPh... |
|
2024-10-07 | In this episode, the hosts discuss a significant vulnerability found in Kia’s web portal that allows remote control of various car features via their app, potentially enabling unauthorized unlocking and tracking. The conversation highlights the broader... |
|
2024-09-30 |
Discord’s New End-to-End Encryption, LinkedIn Using Your Data for AI Training In episode 348, Tom and Scott discuss Discord’s new end-to-end encryption for audio and video calls, involving the DAVE Protocol, third-party vetting by Trail of Bits, and its impact on users. They also address LinkedIn’s controversial move to automati... |
|